Resubmissions
17-04-2024 12:21
240417-pjjbwaga8s 319-03-2024 10:24
240319-mfpy5sad21 319-03-2024 10:24
240319-mfb3aahe54 119-03-2024 10:21
240319-mdp65ahd96 419-03-2024 10:18
240319-mcen1ahd67 819-03-2024 10:07
240319-l5x6dahb83 319-03-2024 10:03
240319-l3vbpshh6z 8Analysis
-
max time kernel
1799s -
max time network
1693s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-03-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
EEEE.webp
Resource
win10v2004-20240319-en
Behavioral task
behavioral2
Sample
EEEE.webp
Resource
win11-20240221-en
General
-
Target
EEEE.webp
-
Size
29KB
-
MD5
9485ce793d80b28b1f1a5041df199f36
-
SHA1
cc6ef9708c3d31f6285e6172745f3af032d8342c
-
SHA256
0a411e6a7f0499422b355db020dbc65be2cd2ef1fa297b752587080e66cac8d5
-
SHA512
e547b8ff6d1b5c54740426ad387530acedb1778b2d79f10ce793eb4adc8b85b02078622a188dfa0428e500918773095a60faef4285059ed43418872e555c478e
-
SSDEEP
768:iHv2vZr2itn04pqNFiFe3QCtVJ1b/7z8Vi7lo:F2Kek4QC7J1b/H8Co
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553860244386399" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1588 2520 cmd.exe 82 PID 2520 wrote to memory of 1588 2520 cmd.exe 82 PID 1588 wrote to memory of 700 1588 chrome.exe 85 PID 1588 wrote to memory of 700 1588 chrome.exe 85 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 2052 1588 chrome.exe 88 PID 1588 wrote to memory of 3764 1588 chrome.exe 89 PID 1588 wrote to memory of 3764 1588 chrome.exe 89 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90 PID 1588 wrote to memory of 392 1588 chrome.exe 90
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EEEE.webp1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\EEEE.webp2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffccf209758,0x7ffccf209768,0x7ffccf2097783⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:23⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:83⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:83⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:13⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:13⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:83⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4884 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:83⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:83⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e36d3b172422d93e30cb4904538d0d44
SHA1ed4cd5b7c2e50ddee42bd001b54a9e618598423a
SHA2562ac9ce164a0ad0266789ccc86b7e6b2650d5e1d758150dc48e293d87d9dda4aa
SHA51218348af4ea39d52fd330edbb7d72a63ea1473a0c39572e4e61c2438c0ac7c26ad3008189fd7d4f7a4b4ca53fa69b11073dad0b55ffd9522fbc7b94698ec967c5
-
Filesize
6KB
MD5f3232abdef753077fe5eebaaddc18ebe
SHA1fe13767a1098865670f9888c2242f1bde3a6d98b
SHA256268dfae6f42376731b4a58453eedb8e0d7826d90a018b482b5319f761b7bb184
SHA512b8bd9912bfea8e948a421e285d175b5f732e925c6859b7b5d7d89dc136b855ba236c9ec335ad191eac8b55840c10ef315c58cf5b4d3d391d21ff0fe57663054a
-
Filesize
6KB
MD5b3ca1aed052eaa197e5c012fade4d9ac
SHA11855246156bb288227e4a72c904663613bd5a99e
SHA25650ab7ecfdce9e08f20972012a8f1eae1354379a47f6b26599e2aa9d5bbb996e5
SHA512b13e37a130ac3db91cf857161e3d45d5ef9cc59e36daea921b3adef66f36aab6a861f7bc661c8c78af4d1153336829e169475e87e93b28c5ded92a98416bc52f
-
Filesize
15KB
MD5529fa7cfe10324c3d5b2b87f2b175970
SHA1357bf4e683d9a41fd7cad65d07990baefe7d15b0
SHA25638e77550f8ee04764ba4fa9ad63d4f1f3c59f7f48ee8af80e34dfde86b665d8c
SHA5125c71b65c31f544798e2b2e387ac4a51e7c6a1c968b6fe57675bb558db49d98c5c9ec1361b0f2d46cca3dbbfdef2efbd36ad22455d7e750992c081c8d9d1446d7
-
Filesize
260KB
MD524fd2917a3651bd046c621da6d34971b
SHA188ace5d522c0da5b78681552350cdf7d226c6c7d
SHA256d44686b2777f72faecfce2e30f7453744631c6065f855da9ad08e58524e481b8
SHA51242b8ab0016d6388e9bc2224428c50a25bcd3986a7182f7f1af8479fbe365395906d0254d7fd9477a043e30329a71e9a03bed29ac2263230ec3ea472c7d37850c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd