Analysis
-
max time kernel
1799s -
max time network
1716s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
IRC.dll
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
LOIC.exe
Resource
win10-20240221-en
General
-
Target
IRC.dll
-
Size
79KB
-
MD5
f21ae5e05942e1bf0a8d790a8ac1db79
-
SHA1
fc3a681ed4262f8d6da491b001cd8eca0d49333b
-
SHA256
4161b837e483d66f51628721b767c87da74b0919db350e26b8e29cc2ff6632e1
-
SHA512
6c7f7d5f563688c41ce68b0ed6849833d6ca2342ce08c255686ca3770403194595d2cdf54effdef04e16d405e48c3e3fb49552f8cd03aaafb12363b4d3a8c2c6
-
SSDEEP
1536:jfFpA9WiXDejive1YclFqGtKGECA6yyPSSgWWVJUH6pXd5Pot:7FpA9WiXDYive1lTbKD6yyP/WVJat
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133550171789757021" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 524 chrome.exe 524 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2660 2808 rundll32.exe 74 PID 2808 wrote to memory of 2660 2808 rundll32.exe 74 PID 2808 wrote to memory of 2660 2808 rundll32.exe 74 PID 524 wrote to memory of 3356 524 chrome.exe 81 PID 524 wrote to memory of 3356 524 chrome.exe 81 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 4068 524 chrome.exe 83 PID 524 wrote to memory of 2076 524 chrome.exe 84 PID 524 wrote to memory of 2076 524 chrome.exe 84 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85 PID 524 wrote to memory of 4412 524 chrome.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IRC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IRC.dll,#12⤵PID:2660
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4976
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc8e679758,0x7ffc8e679768,0x7ffc8e6797782⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:22⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4440 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4992 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:82⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2500 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7adff862-2d38-4cf9-9cb6-1e1d2ca6b9c7.tmp
Filesize1KB
MD56f60182b48c0585efaaec0932d8dbee5
SHA1022434b4dd897f20c330b08efc8334538393b1b4
SHA256128789489629bec649bf8880f30a836edea8677d6aeb404d31c9893f478691e8
SHA5129c59cd171fa99c87854229ad1be0b618de8db89208bacfc731ef32dcc76471078878a2997e4d80fa1b287f84f965fc24c8b81763bded0657377e9c8d2482fcda
-
Filesize
1KB
MD59c09ee979ce8ebebcaeaa4dc7a260e96
SHA1a4ca7c2fdc7f636467d979dfc49df566b3f05ef0
SHA25617736daf3982631fbff9aa01b98fde18150b4b85ce8b59e52767943f9a89ee28
SHA5129b3ab5eb4231078ad51809b329896e26024a9ae2a87324d0ef7338f55729e4e2ac5f6a1acd7818e7a0610f2d985a3d897b911a2ba076a47ac453f3ba468d03a9
-
Filesize
1KB
MD51b41fabdd9e2b6c01141d9506c2968f6
SHA193b77e56d4b343b4df6a12ec51fa4c60eb9f892b
SHA25635009c4f70f45180192436769bae8b93e975b475cbf75bfb2c3cf29a0e197720
SHA51227099c7c78b599983a1300de5f1b7343baadc3c0c44c6d3485807538e109170aa3eb96040c5ae65ad7830eb49c7e28402119a8a0b095966e0358e0648be6377f
-
Filesize
1KB
MD5e6ab8dfb71bdfa5826da5f5026115b4e
SHA1d316a7495624701ac5cd9b77b6969d8e71d6d968
SHA256001816b5b231dacdfeca0886aa0a71f384ae3a365c8dee6a0cdaf4979056b86e
SHA512aeabe4e506bdcf5931e2b77530b52ef1ba1b2aa3b696fc831db1f839108c9d03a05feb0f621a0831d3c369cef80cf5ac89a0f8b3647215a1b9d39acb0d617b18
-
Filesize
371B
MD59573cac8a7ef0c2af232621da531ea98
SHA145151771363d7133d9630a32c3f3ecac113663b7
SHA25639877092fd67a008812478f71655ae0a0f4c60dc8984b35518a4dcfd9bd55874
SHA512fd7732934c1f8b505a3ca8e9a34877fb4a8942d990f6174c8b417768d80b79e54220674c5764e41ff3d43e9ad4a46222331fc1b70db906b5d6fe09268cee730b
-
Filesize
6KB
MD58428c40767c3c99aa32a3a2e88fa6aff
SHA19de6710b1e8fdefa45feff817c6765cec3200f59
SHA256b6ec3d008d4643815360c1efc1c75c4e231b6fad76c21c7711ccc7214aa51e3d
SHA5127b3c94642059c8f64553372230194c89f8947d9c8ed8b57f22af6dec1b24c7fadd68dd784e6bb156c95f4404d2a99228d8bd639acec09466052325e8fda5d97a
-
Filesize
6KB
MD5174395c29641a81f470f60242409bba0
SHA19cee92ac7f2b7328f9898e74dc7c6cdaa92ac5ef
SHA256b4b49a3cebc2485734531b84536228c1666e8de0ae72808a25f1162ec1c75682
SHA51232d655ae5ffd8f35177d6f47a4267a699ada63dcd9f44331959f7ece0c2f86f34db55d6af13c2a775f34f2a3f3f961a2f838ec33f282dcaba578d9cc6f7b641c
-
Filesize
15KB
MD563f03b8a8dd1c64f56bc92bc192be83e
SHA118d07142b70b0f3805cb542a8c16eb8a1f45655f
SHA256b142d4b8469cc3b6571d1429540d4dd1fc6e1e9cc645870193008d6e639218be
SHA512797e637f9f6ddecdab4e892fc911b085f673c9dc568385c8da821a03d7f598cf51f61b2a823a023f6ebef7e189f4006832e72125c901ab25035441e4983e3834
-
Filesize
260KB
MD5b73441c63a706c72a831c9c7d3c7803a
SHA1a9e082e892944ffa31367d0bb22cc37e6ce463f5
SHA256221788fe291fe7d4dc07dbf1be15ad116629bcbb434c1dccaec23a1b4de8cfea
SHA51205d37f036358ac8806b8cb0ae4f8a02645500cf689fa1a850a765f16bfa982386ee625090600cf2d17f63d54e1372b3ac094d0718ac407b8bac057d0ff5d1bab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd