Overview
overview
7Static
static
3HS Loader.exe
windows10-2004-x64
7HS Loader.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows11-21h2-x64
3HS Loader.exe
windows10-2004-x64
7HS Loader.exe
windows11-21h2-x64
7LICENSE.electron.txt
windows10-2004-x64
1LICENSE.electron.txt
windows11-21h2-x64
3LICENSES.c...m.html
windows10-2004-x64
1LICENSES.c...m.html
windows11-21h2-x64
1d3dcompiler_47.dll
windows10-2004-x64
1d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows10-2004-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows10-2004-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows10-2004-x64
1libGLESv2.dll
windows11-21h2-x64
1resources/elevate.exe
windows10-2004-x64
1resources/elevate.exe
windows11-21h2-x64
1vk_swiftshader.dll
windows10-2004-x64
1vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows10-2004-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...7z.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3Analysis
-
max time kernel
1199s -
max time network
1175s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/05/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
HS Loader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
HS Loader.exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app-64.7z
Resource
win11-20240419-en
Behavioral task
behavioral9
Sample
HS Loader.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
HS Loader.exe
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
LICENSE.electron.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral12
Sample
LICENSE.electron.txt
Resource
win11-20240426-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win11-20240426-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d3dcompiler_47.dll
Resource
win11-20240426-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral18
Sample
ffmpeg.dll
Resource
win11-20240419-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral20
Sample
libEGL.dll
Resource
win11-20240419-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
libGLESv2.dll
Resource
win11-20240419-en
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral24
Sample
resources/elevate.exe
Resource
win11-20240419-en
Behavioral task
behavioral25
Sample
vk_swiftshader.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win11-20240426-en
Behavioral task
behavioral27
Sample
vulkan-1.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral28
Sample
vulkan-1.dll
Resource
win11-20240419-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240426-en
General
-
Target
LICENSES.chromium.html
-
Size
8.8MB
-
MD5
2675b30d524b6c79b6cee41af86fc619
-
SHA1
407716c1bb83c211bcb51efbbcb6bf2ef1664e5b
-
SHA256
6a717038f81271f62318212f00b1a2173b9cb0cc435f984710ac8355eb409081
-
SHA512
3214341da8bf3347a6874535bb0ff8d059ee604e779491780f2b29172f9963e23acbe3c534d888f7a3b99274f46d0628962e1e72a5d3fc6f18ca2b62343df485
-
SSDEEP
24576:cpD6826x5kSWSsRinoHnmfm646a6N6z68SH4SApTJ:cHSek
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133590933695363050" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 3540 3468 chrome.exe 80 PID 3468 wrote to memory of 3540 3468 chrome.exe 80 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 3424 3468 chrome.exe 81 PID 3468 wrote to memory of 1832 3468 chrome.exe 82 PID 3468 wrote to memory of 1832 3468 chrome.exe 82 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83 PID 3468 wrote to memory of 2976 3468 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffc8111ab58,0x7ffc8111ab68,0x7ffc8111ab782⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:22⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2172 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:12⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1792,i,9907734513453584644,10632024698570956615,131072 /prefetch:22⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5048ea58611c419086f1a9c5d7f212d81
SHA13f0c7e66bf30e143649d7643e18aae2ddae22397
SHA256e1257b30d54446eaff982c22501250d9552e0944e678c9a4960c582c8a177041
SHA512ee340992abb57635232491d601d2a8191d4b70b23c29fdec9f1b5d30926deda74438d468dcfd63278d50e5bc03a2853134a6c36b6c63128c0708ebfc02d61b0a
-
Filesize
130KB
MD55d8df352d0493c32d413cec229a982c8
SHA1298971cdff2b811b0e4ddf7bed27d69efc56d89a
SHA2565c4b4691190cd88f6c03c3fd7f62e7f6974129c7eb7e2df00fda70c734ecadea
SHA512705dcdec712f0ef3c4291b70bdb853f0b4f77b9a58c6ae4d8739f7abef230d4628ebb837ac19ca50b6179cc736e78fd041ccb0cbdc67ad219ebefff3f9a2b7ce