Analysis
-
max time kernel
21s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot_2024-04-14_at_11.50.58_AM.webp
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Screenshot_2024-04-14_at_11.50.58_AM.webp
Resource
win10v2004-20240412-en
General
-
Target
Screenshot_2024-04-14_at_11.50.58_AM.webp
-
Size
84KB
-
MD5
f16131148111d8c405c950501df48c09
-
SHA1
67e978639c158639f0c9ffeb27af3cf5b86770ae
-
SHA256
be91b3072903e20cf09cabde3c07282fad39d379a5daca51c4e92a4b5d7c08d6
-
SHA512
baa2c501ea33172c045ee2b7c6d3b63d220768253395fdce896b558cf0c88b3c33999fb9c5c34f4326c47ca78ef20f93c77198afd990a93f96eff3035b776e99
-
SSDEEP
1536:P0SAHawNL8JY10B4RhuqeTvt0TRd4PmPC1jWPx+ZssGG09veanj956YJio2BL:sSCawNLaYGBuuvTvKRdIXZsiWWEj95XS
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 wtfismyip.com 29 wtfismyip.com 34 wtfismyip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2564 1148 cmd.exe 29 PID 1148 wrote to memory of 2564 1148 cmd.exe 29 PID 1148 wrote to memory of 2564 1148 cmd.exe 29 PID 2564 wrote to memory of 2660 2564 chrome.exe 30 PID 2564 wrote to memory of 2660 2564 chrome.exe 30 PID 2564 wrote to memory of 2660 2564 chrome.exe 30 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2452 2564 chrome.exe 32 PID 2564 wrote to memory of 2508 2564 chrome.exe 33 PID 2564 wrote to memory of 2508 2564 chrome.exe 33 PID 2564 wrote to memory of 2508 2564 chrome.exe 33 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34 PID 2564 wrote to memory of 1464 2564 chrome.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Screenshot_2024-04-14_at_11.50.58_AM.webp1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Screenshot_2024-04-14_at_11.50.58_AM.webp2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67d9758,0x7fef67d9768,0x7fef67d97783⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:23⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1392 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:83⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:83⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:13⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:13⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:23⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:83⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3576 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:13⤵PID:288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3876 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:13⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3828 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:83⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4088 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:83⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1620 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:13⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3676 --field-trial-handle=1204,i,32385161822338192,13273432014857001336,131072 /prefetch:83⤵PID:1616
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1076
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5214b2fa780663e5b1778c56a8c0c63fd
SHA12a82b012c67b9f595eb9d236514bdc5fd69f99e1
SHA256916ba93a76b04c7ba7dd845ba5df93b495016834581ea315af3b99207251cf47
SHA5126d1b74be3c6db291094fd464f4a6e9495e5d88eae0ab98cd94c27c2d201cc002c5dbac312157693ffb97504b14b1137f6faece68e5bce762a215d58466555ec7
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD588a515649eb94010491a0d38ce59a13f
SHA157b8c62e97a8af11bb9dcb861884401c99ae93a3
SHA256c3adc1b6f759eb98000c3021744267a9875aee8c540f844a5ae40cac1ed44e9d
SHA512f9e1d083dcd968c89ae2809e0a6906cfc7487fc89dd468afc17f9063842f824dc67dcad351c8957faea5a3348c7c79a6f1d6cd1b8174ddc66b2403cfb854247f
-
Filesize
6KB
MD561e6598b8e11770b073ed4b10653b4e3
SHA18de266278cc162455fdb2a872932ad98fb59700b
SHA256609df95c2be5ab971557b4cadaeabe82f407e5f8d1fd47c9c26b6f380a5aa55d
SHA512bbf48e1be86aaeabc0b844520fbf5415b2a44658ca3b0f226aa9508930a1433e3179b72e6d64da1ce4a77a8c564dc5f185c82cc849098cec5c079e4df326a40e
-
Filesize
5KB
MD516a739d7d37e349cb3c005c8f08560a7
SHA156fa06b3390f44d6a79e7726888b92648c4018f3
SHA2565381ce482f0747738a0e32697daf58207906e42996413d8bdfd688816aca3e95
SHA51298abad4963dad6d0b54df10e703c891e24b9645daa611de202b4618db3104703ddff7c60313e9d6c471958a62da56ce0edf6c7871eefb28abf29282381b9ad57
-
Filesize
5KB
MD50197d2da644715f0725e487f005045ab
SHA1467ed139630f55c3c14717facfb1353a9b36a214
SHA256a4d368684b1c806fdd726928d5a99fd53ee47d20749e8f44f9a913b51f75924a
SHA512d7d5e166e69e9776a0637070c15ddde7fc0fe86e11e02c60f5765da22535bb0a237e2086b067a2e92d7d2d7197761b837445357bc9468642747193f869cc9cd9
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2