Resubmissions
25-05-2024 08:12
240525-j3vw5abc6y 1Analysis
-
max time kernel
111s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Launcher.bat
Resource
win10v2004-20240508-en
General
-
Target
Launcher.bat
-
Size
722B
-
MD5
d3536bea5d026490a43f81ce81f8af36
-
SHA1
9dfae9303c3cc6059dde651de143d692bd250715
-
SHA256
e5ac9e35df655c6014503b3f3c0cf7beca2839798f973e031b353d8f58679bea
-
SHA512
1fcd1685d10adb21011a7125dc75e8e1c39652bd04a13d511a8c4b7bea6fb8e1df7fd6c4289b6c754e658cd30d765952b8a2b985c66f58255f16ba59406df5a5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133610984303351665" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1144 3668 cmd.exe 85 PID 3668 wrote to memory of 1144 3668 cmd.exe 85 PID 3200 wrote to memory of 4048 3200 chrome.exe 99 PID 3200 wrote to memory of 4048 3200 chrome.exe 99 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4476 3200 chrome.exe 100 PID 3200 wrote to memory of 4216 3200 chrome.exe 101 PID 3200 wrote to memory of 4216 3200 chrome.exe 101 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102 PID 3200 wrote to memory of 3616 3200 chrome.exe 102
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:1144
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8e37dab58,0x7ff8e37dab68,0x7ff8e37dab782⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:22⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3668 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1820,i,8572409828709032953,16126744664164979971,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c5dd61ba3a3cd627e28bb039884928c4
SHA162bb678b473f8f8e4ff8f5e4fbc9589d4d8ee9be
SHA256147b80a283982a99a0401cb2da38c31b3e2d9175d41a4522b76ad397a28d6633
SHA512c7225867d233694d61e7b5f3b1a20b9f0c9f6182715c0a94c0adc0459b442a1350362a23046f00e1865b9392577e2481c7ef6659633c59512e17c3ff81975808
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD504b75f09cb7bae0f88c22aa95c084d08
SHA1195bb4c2045aba7ab3bc5432e65dbb5d0509338d
SHA2566c349bddaefdb8d9fb993dec1ae32c0ac29f3f6704ef4245f7ddf416bef8007e
SHA51242d95157ac52f2bc4bf404d2518c3031b22d8db03f3b3688c30495e2555808e18d5ec3b9804c3d4c0b6161aeaa58deea40a5eaa0419ff7e0eab9262c512c8f21
-
Filesize
255KB
MD57aa0a8f9fa9dd19defc73c80c4542059
SHA11c05fa09cbfcada2f9dc448d78e0cd2bff7ad712
SHA256ce099c62f3b8b975a810a9b3f7ae959d094830a1a34f81b00cae4318570c1ffe
SHA5120a4787cd9545d71b9a4a51a2b1055e48ddc2b545af5752168989676096a40229fee45117d855b9ced5a4ddec805be8391587b819f1dc4e5dc0bc28e6f6077837
-
Filesize
255KB
MD5ba02568c4940beda8fcbf6af204e37db
SHA186d3aec2a92100d023961c511ac2acce43b4b5e5
SHA2564ea7fa951da82ccc1cdb7f20f2da0c4d0617081380639cdccda4a04678e2697b
SHA5121b984b1443ee78542b1212aeaae6252e42f816b22653fd580364a49396e063fc2f54e07cfba48c40182ace7cfea056773ab06abee80b1f6a1401eb6ca6ddab3b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58