Analysis
-
max time kernel
1050s -
max time network
978s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2024 13:19
Behavioral task
behavioral1
Sample
Ro-exec/Defender_Settings.vbs
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
Ro-exec/defcon.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Ro-exec/loader.exe
Resource
win10v2004-20240412-en
General
-
Target
Ro-exec/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133574880133157923" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4372 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 5048 4420 chrome.exe 93 PID 4420 wrote to memory of 5048 4420 chrome.exe 93 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4828 4420 chrome.exe 94 PID 4420 wrote to memory of 4888 4420 chrome.exe 95 PID 4420 wrote to memory of 4888 4420 chrome.exe 95 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96 PID 4420 wrote to memory of 1060 4420 chrome.exe 96
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ro-exec\Defender_Settings.vbs"1⤵
- Modifies registry class
PID:3300
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff430fab58,0x7fff430fab68,0x7fff430fab782⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1404 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:22⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:12⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4340 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4468 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4620 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4748 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4156 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4968 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1924,i,8388579252403329838,15474480717702928559,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5979e785275b560e4bbe1746fed8f6a8a
SHA13cd87bdc0f6221375dc8841dc1b1019779ede3fe
SHA256a948f24fbf94511b5c26cf356cb35b1ee08421ad609b6e88786c90c156c655f0
SHA512dcf72d0a73832f78b1bccdd97798d96889c9062ee9f0b3c909ef8ff022691084abd923a172c582feab1972d548deedb9e64aec24284e88551c0267ac6344bf6f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5426021e07d4043ed54a0ddfba4887d07
SHA18e7d462239851e4d1755d0ce6b4bd221cc6c645e
SHA256b273c8d04305a74708a4d89e44803f8b5ee0a47a1647ede603c69c1ae37cb655
SHA51242ec8d62d663516f54e09895b4f51aea9b5bf0e55fcd28fd702a516a96eacb9bd0bb07adfb3d0069f051b2e4ad089a3442120fb4bb435ec30e37db3c7d354bf6
-
Filesize
6KB
MD5a51fdeb128c142ebeb234169e8dbc61e
SHA1710b519a0c8ba9c6c8f1c9406aebd2849a5ec816
SHA2566b23ef193749f76f7c81b47d9ea20843645ec77416e49be3a13167abde67de8b
SHA512e099503e592e96992c85ce733a456a4103231fd4bc1bc10bc5a99ff96231e9172d34a1082f65533b5a581823cb072024d5820d763a0df0b01b78777f6aa25959
-
Filesize
16KB
MD52b12daf62ef1154b1b6a1b6021c9f4f1
SHA14975abba456033e1554e83c35e3c893ab874e2cd
SHA256c86d98430f6160b784e2b10d78c40b7f5ec6322dfc8ad207e7a64d1a2297e9d1
SHA51236c5565860c817eeb2f4fcc980718c188c62e0c416f866140c407efe0fcacb46d97036c517a852d4060e63800b837dc9810021e2aedad2fa9f4056cba02de2d0
-
Filesize
251KB
MD5ab36d6a1c326bbfeb5938935eabc96ee
SHA13506aabdcd792b2123dc8203a08ec7af113d3ca3
SHA2562112469c84aed6029b69cffbc7d836205f513fdb6bca0a5d1aa2f1c68e6fcb17
SHA5127993936cbc8ebe1bfca72eee560687affd4049c6dc98216ef21ef780e7c4b360fe87b74980eda44e57433783b0b323789113df24771f90c52ab07d058baaae65