Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif
Resource
win10v2004-20240426-en
General
-
Target
sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608031730926735" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1852 1848 chrome.exe 83 PID 1848 wrote to memory of 1852 1848 chrome.exe 83 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 4476 1848 chrome.exe 84 PID 1848 wrote to memory of 1404 1848 chrome.exe 85 PID 1848 wrote to memory of 1404 1848 chrome.exe 85 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86 PID 1848 wrote to memory of 4464 1848 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sb5flHwTC-yxh3ysR2Y1SJzSkTc=372.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe8acab58,0x7fffe8acab68,0x7fffe8acab782⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:22⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1588 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 --field-trial-handle=1908,i,12035419377063952425,5391087520524190447,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50e1b7397ee1d5ab92c1179f8d57b6787
SHA13c983ab726393820b02d182ea0fb410703f3bdc8
SHA256866622a39c78e5711349337a0d400ca5f0a2be94c82bbdff5bec1ebe185d3f39
SHA512c6d3b468a3c752cd88243592cc7c3bf72b7c2c9ae45cfae54d6ccca0e4c46ca2ae8d2735770cd257712bb3d680e1e6042df3ce72811e0e91d7e9e4e48f50c42b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD579c1f5d62c7bb02781de14bf74771956
SHA184fa589ae321abca30b0a34e710b8a4e6d4ba6af
SHA256aaa90439a08b1981a2ad661ba911114696b49ea49b0decda3ad676ffb8683397
SHA512101697934aee70fe30dc00bf65d90e80c1325704983db1052406104d6130c4467e0e578afb6baab6d3d7aa5fdd2635b42ddc455da23c8e08662a305454b1a070
-
Filesize
130KB
MD5ea394f71a2804b7233ddc1227e3a85ca
SHA16784c332489695b42c0c866cb27430e505f78856
SHA25699651f69120c2382e0bb37d4a7da70ba2808286942dccd8e281d89c1635cf7b7
SHA5122b266bb8a88c096417c0a705e87bf5890366192cc6c74bf9c93aae2b26bbc6daac2c1cc3b08fc116423e36480c8e35adcb703dbbc2c93668581d34f32c6e2b38