Analysis
-
max time kernel
95s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:53
Behavioral task
behavioral1
Sample
loader.exe
Resource
win10v2004-20240426-en
General
-
Target
loader.exe
-
Size
4.0MB
-
MD5
f58dd04f32283b3486a2975d9799ccaf
-
SHA1
55ccf0d233a324629bdef83137128c0c3842a644
-
SHA256
89bad645a84de650a4d3b032e2438a04a7bd31f360fd1f0228d5a6676b23025b
-
SHA512
150d19a2d3528e9d4866c0e9499c623ae4f60b7d1db5c5345ad52a72d287f1325392c4ef6138e9ce4cd1a4696ba45a0d6a779d0ab951eb240b6b292ca78959cb
-
SSDEEP
98304:IiK+YxxzyCFvL2RlgXt5LutKevmgiihvpl4:2+YjzyCNL2LctVut7p4
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/4844-0-0x00007FF6327D0000-0x00007FF633212000-memory.dmp themida -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608849279268756" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1868 wrote to memory of 4964 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4964 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 3076 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4232 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4232 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 696 1868 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵PID:4844
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb561aab58,0x7ffb561aab68,0x7ffb561aab782⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:22⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2304 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:82⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:12⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1944,i,6840926835987601546,14322648726385340218,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e14229ac-ac05-4328-be44-82f88811919c.tmp
Filesize6KB
MD558e20a9ebc97e1d1526980881bdbfe53
SHA19a3b639e7015f7c2a7462a370b0b4a79e634de99
SHA2569d57074c5ccf41fa56b242c43b8004723b1f8797b7a8ad040c48985a35a93563
SHA5123bc19eda2ffde9f0cd48211648d40713cf416f40181f74dd8e56b6df46ca0ff5777c0c4a5fdcb07a30a5a15408b942f3711254f8b7ed31400933472529cc2734
-
Filesize
130KB
MD5bd76f84bf3c4fc4b0d2189e83189c081
SHA1175ce4659321b10e18763092e1b82c65c994df55
SHA25650b690a261a2a7294e69d865d57c3591ef34f6dbe43d0d3853e784b485740423
SHA51281d6fb2310400e0c708a5a645ab6cbb047472e98109985317fbccb37568c2195939c13433d261c6819826046870aa119911068c25be96be18b1d7a02d8c51e08
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e