Analysis
-
max time kernel
1799s -
max time network
1758s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-04-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
Untitled112_20230728205939.png
Resource
win11-20240412-en
General
-
Target
Untitled112_20230728205939.png
-
Size
112KB
-
MD5
bb7e1051c5513c6b292527d64e6b9d6f
-
SHA1
668197fda4d93bc0246445588d55c9dd332be99a
-
SHA256
9e8d321364c314b2bc413f9aa35759462716bfc80c5553cf15d263189ebd166b
-
SHA512
3ef53322d1af060e02e66df83f1c066e5c5691dc404ee7f12a2efa9a3d5938bb27dd7d3cf1c6291a37418a66cba286a6a0130c83a00631687115b7ea9f3e1598
-
SSDEEP
3072:nCOw51PjdECqDhYdX0GPTsCeDI1Bv2+iDazcAuiAG:n+WCH1BegBv2+Sazc8AG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584003329795030" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3608 4024 chrome.exe 85 PID 4024 wrote to memory of 3608 4024 chrome.exe 85 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 760 4024 chrome.exe 86 PID 4024 wrote to memory of 2736 4024 chrome.exe 87 PID 4024 wrote to memory of 2736 4024 chrome.exe 87 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88 PID 4024 wrote to memory of 804 4024 chrome.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Untitled112_20230728205939.png1⤵PID:3052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe6015ab58,0x7ffe6015ab68,0x7ffe6015ab782⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:22⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4188 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4292 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4480 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4748 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1832,i,17225950675122417643,5966401587042982351,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c0560ab5b74f9908097a3705ab2365a2
SHA1ee12ef7076db030d08e6703d8bf56ced8a407e31
SHA256c90ee5c2edc38f492f1c696f72298334d01b93f11f156db9002f49b4f2917013
SHA512510ee671bc69387038e6d82ebd6179112b7ac5377c0fc11aaac5b58a7997711e9f3e767726cb65899a290afacdb2ed6b30ab900882612c5977eb1cb4d7585593
-
Filesize
1KB
MD56da699ad546dcd3252a303f7f1595d0a
SHA187caced1f435e3e1d30139c2a3c62731eac921f5
SHA256d22a27aa53315f1bb883aa011f0e54fce16e747a031ed384a005398076913f50
SHA5123315a3eb5b6fb05038f86028d5f17f6ca417c4a3bb51ad96282123796c9d9500e1d3decbf3089fdda371d84af6d36a79485f3992c58ec0a9c63979bc467a6db3
-
Filesize
1KB
MD5e748f62f4d83af6472eebb847d0f81df
SHA172113cb5bf89fdf306169f6bf7f1ff9dfcb9d30c
SHA2566ac52dde1e3c24b14bfb39bee51dad101721fe92329e2b409ba697e0bbe7af27
SHA5122e61deb5328258759394776f54cfcbb66b5c9aca5c5cc60b0f7cd3e6d990b698a4b769a3266f00cc52a127d041822f225c20e2400c76c44e692a259c586147cc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5769460af46393b1cf81a27c693a48384
SHA1d1ddee22a3be3771d21fc5fd90f0c94a6ff9c42b
SHA256f7edf5efeeb407e9a72bdfaf215677468d41e66ff1005d800bb6eb4553846f56
SHA512a206a9e4518e8b9521e7c63b836a7dfd33bfd8b82ffd4fb2611e9980cd3bf9e05241d6476a8763b4c101c84704272a6f343e3446bc77143327f0b4c1aaa872c4
-
Filesize
6KB
MD52840f68ec47ce897ad1c594a30aa835e
SHA117975377714a5cf7ff3aa2517c168cdb8c4492e4
SHA2568117a7ca07a4af60a47ba657d4ad243698fab01228c8f2cb57a20376fc32c31b
SHA512e9a9b9244416897a24a60d5390ecc7cc246ad957a949dbc08993a764b03c632f2dba0f46595da60c6d3be07a363f5b4e00d8a4fc99e98562d6f5f585abe7548c
-
Filesize
16KB
MD51863c6a5a639604d2edfecd41d62b28f
SHA19fb7af27f40dc9401ba7e8da84d3bd546d79bc3d
SHA256d5ed73892fdb7d27151ee266e684c61a0cd808cb67346492b2db0aaf9d044aec
SHA512f77d47c15a4674cc587de83d925234eae09ea58fe372a95fdbb9eb6b29453808b6e4ad68ed9859df36dce44feccad8b9c25010da05b5b2e174391632dcaf2a2a
-
Filesize
253KB
MD54f48c4e628a9c27af9992d17aceb4c1a
SHA10ce30aa033e55dd572a3f5a06cea419e932fe973
SHA25688f6db7004fa09e8a4c8dd682e76aed5918e992224aa61a6f53b5edcb40ff66c
SHA512b31f6515ab3ae53c638673d85247daa260298511db2d4131f3815e39f16c099980ac032acd53359124406718bce975118854025e7e251b50a8f9fa09c8b01b6b