Resubmissions
14/05/2024, 16:38
240514-t5p4rseh77 314/05/2024, 16:38
240514-t5hdxseh68 414/05/2024, 16:37
240514-t454laeh59 3Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/05/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
found-caseoh-v0-2tebtqo81aec1.webp
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
found-caseoh-v0-2tebtqo81aec1.webp
Resource
win10v2004-20240508-en
General
-
Target
found-caseoh-v0-2tebtqo81aec1.webp
-
Size
153KB
-
MD5
037166b92b1d700bd9b6105f0642cd7d
-
SHA1
71d74478b7e96dc40f8916143ee6fc8e695eb60e
-
SHA256
b0c48e50569f860f8a08a61e5bb7381c409672ada8ee81bd0ab05b27df55f4c1
-
SHA512
aceed4b79a1d4a6b77a6f1732f0baf7fdda9904338a212d057044563dd4a49537d4e493473ebb00ca480fbf1e83b7379a58a53ef271081a8072f3fefc855635c
-
SSDEEP
3072:l195SarkW0wVIDIPMm6QxC5vD7vWcOZvM1BUVO+ML0:B92tLs+vDEvM1BUV5ML0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602053977358635" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 508 chrome.exe 508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe Token: SeShutdownPrivilege 508 chrome.exe Token: SeCreatePagefilePrivilege 508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe 508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 508 3104 cmd.exe 74 PID 3104 wrote to memory of 508 3104 cmd.exe 74 PID 508 wrote to memory of 4376 508 chrome.exe 76 PID 508 wrote to memory of 4376 508 chrome.exe 76 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 2268 508 chrome.exe 78 PID 508 wrote to memory of 4408 508 chrome.exe 79 PID 508 wrote to memory of 4408 508 chrome.exe 79 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80 PID 508 wrote to memory of 2136 508 chrome.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\found-caseoh-v0-2tebtqo81aec1.webp1⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\found-caseoh-v0-2tebtqo81aec1.webp2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffecc299758,0x7ffecc299768,0x7ffecc2997783⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:23⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:13⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:13⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4716 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:83⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4400 --field-trial-handle=1792,i,14178080182491424671,10611012445110592440,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
795B
MD5ba614e1b9c8110b98d0d21f5fc1c6cc2
SHA1564a5e38c4727cd65ff487140269180348988e7a
SHA25692e59c5a1a2224fa83efeacdbbc4bfa46292a40d9872c6eb61893fbe69847daf
SHA5129d5b6c140ef8c3a39a515f264b48423e9bb4d49a1b5dd7c69cc292e1ffab9f314bea6a0e14d420587f872469db78dda2bff042cd74f6ea242369194c6414850d
-
Filesize
6KB
MD5938bf441862599791b2385fe6afc674e
SHA12556674d706184c972f1100b7d7dcf915296cd64
SHA2563301a223d6783f6f2161344b2fede59ba552f7a39d4a2fedc11f1d250e1cd8d1
SHA512ae4ea3fa24cd3b9dc87f8da3a2145a862c826d9898a569f42a4d7e941102825cf1b7ece6a7897aa5488a434d2f895e2430b5cae5a3d1c3ad9799155435cc791f
-
Filesize
6KB
MD5d1b74882ced66e3b8c961e37448bd0ac
SHA1860a9050f2fb16882e86b076c18436f186ca5c46
SHA256cdf6f835369d7a6087c2862edb381208657de2c8500ea647c7239d1d8eadc821
SHA51251457673ef5895800a8f54c26eee7bc566049d7825d79ba3f85c1df068a89c67fa4ccae5df26951e2cb25969c4524ebd534a1f1beceecd64376c4b9a351581c3
-
Filesize
15KB
MD5f43f2ec4e13fa25d35fe2835176af9d1
SHA1c303b1d5ac905d1cb5fe6f790045e6072fe91634
SHA256ac6044bae7626844be1dbba4895a7807d1b2d532ee71d8cb936e5ee1c49e7ecf
SHA512ff5c89fb35fb93a542d041d8bcbdb6c063bc114fea9d95f784b7c4188b30b616e148313acc37723e0196c89342745e3cd4559b162973d2b4ec37379fe41c31ef
-
Filesize
276KB
MD5999d6d897b2e145c58a4a8209065d466
SHA1a61597af5198ba2443e999a4c638de1652e274b7
SHA256637084acbd4a689e9c56959a06d3c2a2636645dcbe4f09d006f02b8eadc38a10
SHA512cc4f0ebbf16100a009e6ec8ab5c76830338f07cab2c272a6106ce438e20278947e51e06b9a4fc98b2c6c36ad0798a6fe68db55dcc49913978e8c870aeec88e51
-
Filesize
137KB
MD5652cae1a74859f23c6d0bc9d27ccc847
SHA1981a3ef0a2c63cbcb3f0475125314a570652b066
SHA2562f4ed520235f4252185288a90a4ea915636bf71d44585d4ad1270138edb1f7f6
SHA51224f1b4b8c0073d33276b88d2532d07c4b91df9217b73b27672b0807258138c3b3b1fbd8c55806dc396204e635ac2426bd95e2b5ec06054555473931f832d2a1e
-
Filesize
295KB
MD5df24326feefe44d649d256eeda946e82
SHA1979b458ff5c7e02e06b746a88e09d0b7e2006453
SHA256015c4e3a5dcb046cd7038737e0b3ba9cfb64b9fe1e9d87d9d0bcd526a0fefbfd
SHA5129eb3facf261ccb2b74c72681e9fa5f3bb236efdc28fdd08158e59c91d418d5aeaebc69188d1609cbed08c69cda8ed06cb19fe9ea5074712bd83e44f5b2d0b2e9
-
Filesize
275KB
MD56f0e5c5c9487aec2a1c4c76c2f2efceb
SHA1406fbd61b7160a85ffb56db0b1cb1ed9a63a9894
SHA25631b3ef480431eda677709777a9332ebccf4b82dc24625ea007ee12d21e152045
SHA512e1ca5f6b976ca980c60c213570668c6c2785ce3d4f06b877800a0b34dfdfc82aafc2320027830210335f9e7fcac9e9ee28706c3f23b183c7a5e621a057c9da87