Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.Whiter LoveYou.exe
Resource
win7-20240419-en
General
-
Target
Trojan.Win32.Whiter LoveYou.exe
-
Size
22KB
-
MD5
31420227141ade98a5a5228bf8e6a97d
-
SHA1
19329845635ebbc5c4026e111650d3ef42ab05ac
-
SHA256
1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71
-
SHA512
cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7
-
SSDEEP
384:o4LBivz/4RHCxN3IBUDzfGWCw2cKgDwg7dEsL9s+cLUoHl:o4LBu74Ro9ImnfGWJ2cKgsgZDW+cLUe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2484 2044 chrome.exe 29 PID 2044 wrote to memory of 2484 2044 chrome.exe 29 PID 2044 wrote to memory of 2484 2044 chrome.exe 29 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 2684 2044 chrome.exe 31 PID 2044 wrote to memory of 304 2044 chrome.exe 32 PID 2044 wrote to memory of 304 2044 chrome.exe 32 PID 2044 wrote to memory of 304 2044 chrome.exe 32 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33 PID 2044 wrote to memory of 2696 2044 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Whiter LoveYou.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Whiter LoveYou.exe"1⤵PID:2204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7209758,0x7fef7209768,0x7fef72097782⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:22⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1108 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1032 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:22⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1468 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1472 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3436 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 --field-trial-handle=1376,i,13303445542273902205,907881567532991515,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5fead1e873494492474d930c44cd55197
SHA1c6f252c97b3c3adbd937bd5d95982b3909b5ace5
SHA2562bc7a232827e42e03f8d65e82e258a2094e947bd4ef3c92571a1b308a3962f6f
SHA5126260ba83066d158f05aee84feb917d6ca43a3f959732f2a5caaacae162aa46a404b80dcc2dd51378f384d54483851243856fa6b161ec90698bc623227affbd7e
-
Filesize
5KB
MD589b4f5fe613ca05b0b69d82b662e4986
SHA15ce632a5a5aae6c956e72518b40af52aa14647a6
SHA25660536602b0099127cc1bbc47e98c86bbcb4628737b5aa3cdeee5b024671f824d
SHA512c9200da543372393a6819b81f72ef6d9e99457d2bdb1f791b7dd99b4e660bc58a42f098d2aad3797d4a33d31d15a3fd5adc6b47d58fb58a27568d68197ea7e38
-
Filesize
5KB
MD5636df2a6f55f8aa0bfea51b8e4fa2d89
SHA19307fa3af4db1c2e394c072e466cb1b072896ccd
SHA25689109a391b6bbc3995e41bc1259ac64ddc5d9afb9749ab16d9c52e9abec9adb3
SHA5128ab7fef0e5ff2315a01953b94dbc23787fee31696489324c6bca2b88f275b6164fdd7b3f936264a57b0f76c979b3e1de691f0833f796353416f2abfa06310cd1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
295KB
MD5e5f5abae67bf56a869644c4359d49528
SHA196a5d6e821ecb1172cad991c9666ae2ed633ba5f
SHA256295e8c1515cc488166ba660bc06b45b3fcd823670a96ddf1d01779969c6f2e93
SHA512e266b90063f67298a57597b3fcc5b2b55339ef869e283e75b22868b4f53f5b4e1b0f58f3de779164b7deff2b9b2de3376aefeb4b8b9bd14ea60b2eba21ac9b6e
-
Filesize
140KB
MD5cfa2c96d47c6e0e9301ca6005e437b05
SHA1a8d93b49fbc5a5a6d89bc17c584be96f95259f12
SHA25677b9824ebd2079942d3292541c21768593e4193a4bac80056c86a310ace2c794
SHA512535da6e4e4d3589c7f028ebb208d75bd7088d89d85c95fd63657ef5bb040ef9f7a8950667ecfb57c76e0d6de91ee45d91422a93fafaa220d6adbdb373c9cbd1d
-
Filesize
279KB
MD5623909f75daffc492371572faa9f04d6
SHA13b72597499923a268b1fdd1de20cb2d4d8da91e9
SHA256b6a897252df9efcfb1470567da4d7514d5c3c11ca741f6766b2c8e050582aca1
SHA5120c6c49cac62230c31ac8c70bf18bceb2afbc70aac490f82b49d9e66c21b0a41b9909b931c6a4d67df0fee61996a486b3307920e7fdd0357c648ec7af724d0e83