Analysis
-
max time kernel
88s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
Obs_VcamGUI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Obs_VcamGUI.exe
Resource
win10v2004-20240226-en
General
-
Target
Obs_VcamGUI.exe
-
Size
140.5MB
-
MD5
04d6abf89ad6168731259ee31a1e11b0
-
SHA1
5f473fe5428a3dd028f7ac3f3623b61ce760ec01
-
SHA256
40459ec37e818f0d50d385a24dfc0c0542865c4d4a893ea1d02502bce3e788a8
-
SHA512
bbcd4b95456ec2d26b0234b96eb4ee8539fbf011d42a6dd88f432d37258c6dee047ba88b8edd856c715afc763d9065369aa8fc7ad74289fd5970e7518bc59660
-
SSDEEP
786432:O0CQFo/Mnm6jKS6mI72RAZzVQ/T5v7pI1TtLwSTRpf4P1wT1Wyzqenai6:OIFNnuYuBIT5TpKdai6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2440 2428 chrome.exe 32 PID 2428 wrote to memory of 2440 2428 chrome.exe 32 PID 2428 wrote to memory of 2440 2428 chrome.exe 32 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 2780 2428 chrome.exe 34 PID 2428 wrote to memory of 680 2428 chrome.exe 35 PID 2428 wrote to memory of 680 2428 chrome.exe 35 PID 2428 wrote to memory of 680 2428 chrome.exe 35 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36 PID 2428 wrote to memory of 1740 2428 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Obs_VcamGUI.exe"C:\Users\Admin\AppData\Local\Temp\Obs_VcamGUI.exe"1⤵PID:2236
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ae9758,0x7fef5ae9768,0x7fef5ae97782⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:22⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:82⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:12⤵PID:476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1660 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:22⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1084 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3800 --field-trial-handle=1384,i,503454420779811932,8363252840752316589,131072 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
Filesize
168B
MD580ea431192b7b591f191cc477dd1f8b2
SHA1e526d96f3f257bd28227f2a364cea822ffd65534
SHA256b4f808ef2644be2e25a96b767d53e52f2ffbedc96b063e80351ac003c362c580
SHA512da7f6bcf4d3a247b70c4a5b2e1276bfd55d463924649cf1c9f59586117112bff2093b4e2451f70f822ea49981799555b657c46f3d95a42cacf5f38c386ac2170
-
Filesize
168B
MD598b242fb5069ef0d01eeb8ef1ccb9f5c
SHA1f19689e2602ebac5b3625412803ea59072602d99
SHA2562ab0ce5c3762a92827675ece9459a17cdc13c4d24eca8568b9f66e411cf885f0
SHA5123975accceeefe74a51097c25eb0a990754d6322012f88f9039946bbc6c67c2ad9b5b608f32ba28de7b84586fd54990e290ee03b644a0b634abebf2f17a091213
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD55a2eab126bf479fd4b1ee4941257bd1e
SHA1a5730d67bdabd77aaaaaf4b783af24700fe4625e
SHA256742b78d039559f2d52085e87e0a032473820a3d6bd3fb6da48020febd75c3cde
SHA512df5d4235c50c386716c79f65d952dc2a0d585b0a65745b1612024372eb3318598ade985fce821b5bd525f2b7bc969671dcfb7947025935a3a93b0e45865814b7
-
Filesize
4KB
MD51134bb1d783a3da33fc42331a00fbedd
SHA1e88f02265805dc65abb3d48bcff846bfe3f351fb
SHA25616e9e2bf5bf0085fc0604b5b19380ac5244e13b108b216be29481de1e7198f9b
SHA5127afcff08055d4d5ce20ff2f9fe442d89139d234cbacbc02ef57e53fd7e9b4b4b5b4190ad4df0b08be2b8f1980e52663dd829fb841289789c3a5a3b939b03cd50
-
Filesize
4KB
MD5974ec03d2037e4ff37de38e12d36ae9a
SHA1cb875cbbbc4519c0685db50ecbd2eddf31075bb0
SHA25616821a0a990b7f8af2719d43f4d33968c659028378313b9cef1b79391e4dfdd6
SHA5122aff60ca4b96755c1232b14cd7569ab58a3d10a0975b8d308a96ec70e8e3885bd9a32ab78d9015a091940e6c90768e836ee1b1242ba409bae7f2df8e3c9b92f1
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2