Analysis
-
max time kernel
148s -
max time network
335s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
SecHex-GUI.exe
Resource
win10v2004-20240226-en
General
-
Target
SecHex-GUI.exe
-
Size
183KB
-
MD5
c252a43b1d357d08308690545c617031
-
SHA1
10312402951264e103983c4c08582b785b588794
-
SHA256
b779b45849a4ab5bd8ff296e6c95638c5be4da18b67f1fd195b31795bc21cdfc
-
SHA512
c3f359c1bd57276ee9422151e7b32a8232d88b0d2ea220cdd4c1323c39ba7a19540dcd52b393de47274fbbac1b46f4e75d34173fb037ebc755307c80c8cd586f
-
SSDEEP
3072:f8vbzyQ6Y1YXrbNK+3FNxacPEMk65RQA2TWTa/2udv0lf:fszAXNK+3FVFRQdTWTJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546538464127289" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 2824 3976 chrome.exe 109 PID 3976 wrote to memory of 2824 3976 chrome.exe 109 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 1304 3976 chrome.exe 110 PID 3976 wrote to memory of 740 3976 chrome.exe 111 PID 3976 wrote to memory of 740 3976 chrome.exe 111 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112 PID 3976 wrote to memory of 620 3976 chrome.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecHex-GUI.exe"C:\Users\Admin\AppData\Local\Temp\SecHex-GUI.exe"1⤵PID:2268
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3496
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffef2259758,0x7ffef2259768,0x7ffef22597782⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:22⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3768 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:82⤵PID:5144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5324 --field-trial-handle=1832,i,15202541087657951514,11046843797371526524,131072 /prefetch:82⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:5276
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7bbf07688,0x7ff7bbf07698,0x7ff7bbf076a83⤵PID:5292
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5423a192c877343b371c6a6931975d610
SHA18d927b2325f66d5265b0b42c58c9276dd49830bc
SHA256e409534a8c14715674f3aecb20d44f398d7d25ce0f4663259ad5be0d0249adcc
SHA51295b74596e2e7cba6b2d90095f02823e2c1a3fbc34b219f0499354552020d665f19d3a2874100a31790cedab10f71771d37687874c1f432e9ed3297473b5688c6
-
Filesize
371B
MD5121e3f68f4b703f71c581f06b07bec7d
SHA135cde502636228d2ac88357e283056a645cafa76
SHA2561ed8b5d9485625dd6f6f933c57aee8ac5c4162146fd6d41efa81dde89fe68f33
SHA51243e08965acf54315fc81b325ad8d21955b2945aef7b289cad12b92ba6da3c7c0193a6fc15edee03ce1e26f28df5d1f2514713d4dde8495a950b38920d9ea6679
-
Filesize
6KB
MD5e89b9e66ad7ed6cdaa7d6009b2c7d14b
SHA1f69032acc31c8d06e3ae67fd4211b8b08ad32871
SHA2566c96e8bc4e75ee5a040277cc3f9b5675d5f91f1ed3ba9d4ef7496295c720ef20
SHA5121079c6edc2188e3a81c26163b34ec77fa862ab8768dad3ecc4fcd2d63dccbc81d43c97ba3eef8f86e8eb464d3042bc518c29b71e37db20f05f7d16f360918fde
-
Filesize
15KB
MD5965dab148b093c3c2ea17a819172ec2e
SHA1fdf1d5b5755dbb44e1e822677d76ebdba13936c0
SHA25654ec5a45816c5a10dbbbcc802cba2dda15d71a9a215d66a17f7d829757c171a6
SHA512819155886d3b1b3216bc618638db70977ba8c1e98b5d1f5604fa6a878b9026370ada2551da6b39bf58cf46b6d3291f6b578e7bf7e7e65cb7ed730ba998d32985
-
Filesize
257KB
MD57b90a51aab0f7f4fab736f862b7e9977
SHA16a73a065e84b7e5a4ae1607e1c6413bebc937a5e
SHA25610ce9418b6a7707c6689840afa9885987e40b93ecc8fe098068845f443633972
SHA512e60d1864b966ce8d1cabb5df791a862616d40ea2168dc9954a6473ef69a44c22155557d5410a93aa11f8d55f5fe7e7d3d1380c49cf14411c9cada86764e7aed4
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd