Analysis

  • max time kernel
    98s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 15:08

Errors

Reason
Machine shutdown

General

  • Target

    chrome.dll.sig

  • Size

    1KB

  • MD5

    551febd41119cc37d2b0e88f27f0db22

  • SHA1

    381c66a2ce011ca96f3587f2e9048f3076de801c

  • SHA256

    9dc891424224fbbb32b2e421a776d1a81711994d1e3cde7cabd5a80e4c735b12

  • SHA512

    ba4ab9e1831cc94c2d7aa81b826b4aeba23ff5d1271ce4bf97f2fb8b621b37214880c9480d7bf70ddd6acb66d50a89a4b2a74318c58a99144012faf7a85d4ba6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\chrome.dll.sig
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\chrome.dll.sig
      2⤵
      • Modifies registry class
      PID:2712
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
      PID:2836
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
        PID:2656
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2640
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:2892
        • C:\Windows\system32\csrss.exe
          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
          1⤵
          • Enumerates system info in registry
          • Suspicious use of WriteProcessMemory
          PID:1808
        • C:\Windows\system32\winlogon.exe
          winlogon.exe
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2328
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:1420

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Discovery

          System Information Discovery

          2
          T1082

          Query Registry

          1
          T1012

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2640-24-0x0000000140000000-0x00000001405E8000-memory.dmp
            Filesize

            5.9MB

          • memory/2640-25-0x0000000140000000-0x00000001405E8000-memory.dmp
            Filesize

            5.9MB

          • memory/2640-26-0x0000000140000000-0x00000001405E8000-memory.dmp
            Filesize

            5.9MB