Analysis
-
max time kernel
65s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
GTA_SAN_ANDREAS.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GTA_SAN_ANDREAS.html
Resource
win10v2004-20240226-en
General
-
Target
GTA_SAN_ANDREAS.html
-
Size
22KB
-
MD5
b67606448b9c1943b42add86a66ec85b
-
SHA1
6d88d5d65cf33198ba3d67d7a309900107933815
-
SHA256
ce6ea187f348854060f25b2ea42442515d03ca9f7433f935a4bf97529654fa0b
-
SHA512
6c89a6b329308bec15dc00add51dea533156d4bb3c6727ff803da41415683935e1f21821fb864a503213b469ce4dae557377c23cc8df4abe966b63c6a27b5e2c
-
SSDEEP
384:awn7+zoZoafiCngCN4KQ6aoSxmsb1JcL6pXxEbgEaKZaEcXrdKD50NICQSQMSJ8a:JnCzcjfiCngC6Rm5R0vW1Yt6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2200 2784 chrome.exe 28 PID 2784 wrote to memory of 2200 2784 chrome.exe 28 PID 2784 wrote to memory of 2200 2784 chrome.exe 28 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2436 2784 chrome.exe 30 PID 2784 wrote to memory of 2604 2784 chrome.exe 31 PID 2784 wrote to memory of 2604 2784 chrome.exe 31 PID 2784 wrote to memory of 2604 2784 chrome.exe 31 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32 PID 2784 wrote to memory of 2896 2784 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\GTA_SAN_ANDREAS.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6cc9758,0x7fef6cc9768,0x7fef6cc97782⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:22⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1156 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:22⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3196 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 --field-trial-handle=1292,i,10113080225544952961,13530420978674279758,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
204KB
MD549a375a1552aaece20ff48d60c91af20
SHA1d9db7830f441f021699c84a7a08fbc45f3e6a6a1
SHA2564bcccdab7f0945eaae534ec7ce7e7ef5d91bd81a206f98683c32f95b77626fd0
SHA51200fba4379c912f5fd4757558ac8b0a984fa541e09e1fa44bc64e2a43dcb922918ebe8bc777ec5561fb3f89b3b8c3f263a2190895fb2b51bf5e18d1b6f6d97aa0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\file__0.indexeddb.leveldb\CURRENT~RFf7675ad.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD505d8707afdb5746f6fccbe660cec3578
SHA161d9b29fb570c97aab898668d3ea40ebab442970
SHA2567202639a122aa92534dd1ef04d166e0b2390d8d2c72ce5f65ccbc8cac28c86ee
SHA512efb6c7962be81a01bfa8b18fdbc06cca6dfa31b756439e3286ed67e062933481f085be5cda5e9a5e4c043e48a56dea330ce36a6da796fbeadcf7ec07b8708b4c
-
Filesize
4KB
MD5af67b684388ebdb017a448cb70f471dd
SHA17c52e5d3537fd0b630660c6ae924eb35fdc90856
SHA256525250f3cc0fa7b066fc0b21b18b22533597d964e432f321597886ce057741d4
SHA51230a85d9d2c27310da99ff211450f582ff075e003e61e13e823bc802a2478387f8b3775ba69b2cba1c12149488ee03253c21ee998cdcafd06460fc6c4c25e55c9
-
Filesize
4KB
MD5c77fea3d4db8b37459defa091b4d7aa3
SHA176439291910e9a113bd18f9c3d5b60ad47aa34fa
SHA256ae3d4753ec1bfb56875be96930ab3050284d8644a505e0f790cbd5d64145e78f
SHA5129763ec89a6cdc094d04c53b6dff330d2a80f0bf05be09737373259958b2c19886d727afec71bd6a72c428c84836143c64f05a2fde31c6f365b36d1f01ea3c6a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a