Analysis
-
max time kernel
253s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 01:33
Behavioral task
behavioral1
Sample
Sharingan.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Sharingan.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
SharinganAgent.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
SharinganAgent.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
temka.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
temka.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
undtct.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
undtct.dll
Resource
win10v2004-20240412-en
General
-
Target
undtct.dll
-
Size
1015KB
-
MD5
3e9e02ce2b577d62b35c34aa6ec027e2
-
SHA1
9c464e6edc2e6a4bc17d28a68d5217a134b8f368
-
SHA256
2c81fcf3f79f98c78963da78d234dcf6dd36c9503438121d384b39edb0ca272b
-
SHA512
7eb9a3580ce664e78ccf89130581de6e5e816337f4953b192038baafd7ad163a096250aa2f93f4dab68dfec0e25987845777f70d37afd37bab73e793e680f68c
-
SSDEEP
12288:Cab/0Xn458xRrPzrUBHK5fhgxFmXEP2f7K46TnSEl1yt6zzng0LNU5w37A6Dv:ClXn458xRrPztgxoGRNU5w37J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3944 chrome.exe 3944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exechrome.exedescription pid process target process PID 2724 wrote to memory of 4932 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 4932 2724 rundll32.exe rundll32.exe PID 2724 wrote to memory of 4932 2724 rundll32.exe rundll32.exe PID 3944 wrote to memory of 4336 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4336 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 4108 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 2372 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 2372 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe PID 3944 wrote to memory of 3364 3944 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\undtct.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\undtct.dll,#12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f601ab58,0x7ff8f601ab68,0x7ff8f601ab782⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:22⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4000 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4152 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4668 --field-trial-handle=1848,i,5962206645094530429,16871773963435801060,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD575a80c1945fe70149c4ee2dee64781c6
SHA173803cf3e492c25aafda1eb8e4ac2a2e23915d9f
SHA2563032be4cff621276dafcd12fcdcfddee71ceea733bacd1afecbc23208ee4a6f4
SHA5122a054b74d2cf506a6c5df3265b5a010bb4aa148a7991d9461435aefb14c196cd07900bfc0e1140f827eac75452699fec231f42643930508a0b69bb87f4b01b51
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ede82245774a0f4566b50af0668965eb
SHA136a1219e95989bd5ed541ed88db9923a198c429f
SHA2563542591313d0e10a45761ba82b7d1cf0005e190d435f6e52ec631a8b56f0e044
SHA5120dcccb8a6d16f89e7cc09a5be228cd541310ee553cdf14602a4d3b33bce11a84c17ac86e480fa8ebba84785d7a29c44ed1c5bcc3a120c50515c338d9354cb20f
-
Filesize
6KB
MD533fd8a5a29373585f6751a4d6ebcb2ed
SHA114768c73af4ee75728e1233a1db197443afed1f6
SHA256ba147d9a4ac8fff48306cc6607d689edff94a0a4bd7c8f820e9f299e3f0d19f2
SHA5124558cba8188601129a895c9e2c6e28ab58b2e1da5cb40476cd3bb1edf9daa0ebd0b92bc6840769fffd40ddb001a993290d6096b615bd2451ea2a9957435c2c50
-
Filesize
250KB
MD5ab2c7829d15979a59cfa7c1f0a968a36
SHA133fce712b75b4e52b543d4aaf639000c0093e36a
SHA2561933de06a6f2c567e9c7cc46b665ff3c3f940b3a8241b21b32cf9134f6c8e120
SHA5129d81f58c77e91193e03518019124a97937f1758bc547c428dc4dfed994c089630715bd58b999e8d26034a854d4ecc4d43b3a5c4ab3eda6066004ae0475a2239f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e