Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 08:50
Behavioral task
behavioral1
Sample
点击此处安装语言包.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
点击此处安装语言包.exe
Resource
win10v2004-20240426-en
General
-
Target
点击此处安装语言包.exe
-
Size
684KB
-
MD5
d5620f185a317bd0f7ab1748a694fd74
-
SHA1
76a21af9f5633025529a01840f8df0beaa28268d
-
SHA256
8f02c6e234cf3b3c7b5f44f666095093bb1994ffdb9b7af8a4493245718231ac
-
SHA512
a136a321978ae8dcc4a37a1159ea94bdb412f07184028b25a35a24b660813afd47554c8502fcaa57370242a4c597a626fdf054a0298ae1b70cf0e7ff2cf9fa02
-
SSDEEP
12288:LpmaUPwIzTxi+el926/2QHuoKzSxy98GxamDvW3Lj6wpfnyaC+6Ft9:IHwIxi+02oSf6kVDqLltm+m9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2240-1-0x0000000000400000-0x0000000000552000-memory.dmp vmprotect behavioral2/memory/2240-2-0x0000000000400000-0x0000000000552000-memory.dmp vmprotect behavioral2/memory/2240-0-0x0000000000400000-0x0000000000552000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2240 点击此处安装语言包.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588542634720866" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings 点击此处安装语言包.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3744 chrome.exe 3744 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe Token: SeShutdownPrivilege 3744 chrome.exe Token: SeCreatePagefilePrivilege 3744 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe 3744 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3344 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 3024 3744 chrome.exe 89 PID 3744 wrote to memory of 3024 3744 chrome.exe 89 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 3500 3744 chrome.exe 90 PID 3744 wrote to memory of 4404 3744 chrome.exe 91 PID 3744 wrote to memory of 4404 3744 chrome.exe 91 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92 PID 3744 wrote to memory of 1284 3744 chrome.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\点击此处安装语言包.exe"C:\Users\Admin\AppData\Local\Temp\点击此处安装语言包.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:2240
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3202ab58,0x7ffe3202ab68,0x7ffe3202ab782⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:22⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:82⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3628 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:82⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2532 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4780 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3408 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2500 --field-trial-handle=1904,i,14209305203127996120,5324143640545928315,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d34d95685a94620629d4bf35c0d29c1
SHA10551b4921dd2dc409ed3dd6f268e47e4666811af
SHA2569d0a61f4fd6a214008c4fa529586916a5ae377913abf3e7c5cda22d8ae9a6b34
SHA512c57ed7eb2fbf3328de7f6b0bc698f10b7cef2157e2c055d7dadf1794a739e9d18a7cc8518869bf9f1038a53e754a1820092659d43e944286a9b77ddf9b64bc97
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD544ed34db08a8bafa1ff6a79e07f7a276
SHA18bd668609703ab79c86c60ff2854ba043f130ff7
SHA256c6f141382165de9a9ff255e957c6d3b4cdb948c4f0fd3d7c900b5fa6f3a61f6c
SHA512e663d39118bfba7e5e969200b3efb35eb9c3a05209da81a250ef7cc85ea9fadd606755ee7682242e3b1cd2f0b448c053f60603529c47aae2fb53078522f5c7fa
-
Filesize
130KB
MD5fca9893665dc0d64327040510d4eb036
SHA128edc5b5759d6fd2c9ad44e51e0c592e156792a8
SHA25644421ba86605e2192844110947ba43d112fedfce4bf7730b0ce83126128a1671
SHA5123321a14e753ce5a56830cee8e8891ae8a09aa5a5ba9d21e6d2243eaeb2ee5061a9f1d3f604e674f033727e73715acbd32c28d7739a74e75a2034b9053dc51704
-
Filesize
130KB
MD5339094ea0fe106a83c8742ec6fab5d3d
SHA110c384ccd98008e3295aa7d1823d0b1bb8bb0357
SHA25617b4dbff4f026226811109742d8af597caccbaebc240d3381afc8355bfb9096f
SHA5126394c97ff701a0e616502ba966bac73d36f3eb8908bf7d048b0c979e8832cc087e42e598c65421bf8787d5e12ddb840af2b92ba7404ef47b80c93c5105b6f1cf
-
Filesize
264KB
MD58658e5f84feaef9515f2035900ddd325
SHA10931b975f4a2be20461f18aaa8781b7c882eba1e
SHA2562984b3de8b9321267b7422acc2eb72f4e111c286b4bd7265339829ab0b1b1ff3
SHA5125d3585e0a689898a02d8058c339525b6ea3a5557d0866e0fbfb31729eff205a11e85ec8e14d6d2b16da783227e572f49ded00ee908f733026eeecf6e2e55ee86