Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
chrome.dll.sig
Resource
win7-20240419-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
chrome.dll.sig
Resource
win10v2004-20240426-en
windows10-2004-x64
25 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
chrome.dll.sig
-
Size
1KB
-
MD5
551febd41119cc37d2b0e88f27f0db22
-
SHA1
381c66a2ce011ca96f3587f2e9048f3076de801c
-
SHA256
9dc891424224fbbb32b2e421a776d1a81711994d1e3cde7cabd5a80e4c735b12
-
SHA512
ba4ab9e1831cc94c2d7aa81b826b4aeba23ff5d1271ce4bf97f2fb8b621b37214880c9480d7bf70ddd6acb66d50a89a4b2a74318c58a99144012faf7a85d4ba6
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 32 IoCs
Processes:
csrss.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\1\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController csrss.exe -
Modifies data under HKEY_USERS 9 IoCs
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LoadedBefore = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastUserLangID = "1033" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastLoadedDPI = "96" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\SizeName = "NormalSize" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ThemeActive = "1" winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\DllName = "%SystemRoot%\\resources\\themes\\Aero\\Aero.msstyles" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ColorName = "NormalColor" winlogon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached\MachinePreferredUILanguages = 65006e002d00550053000000 winlogon.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
taskmgr.exepid process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2640 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
taskmgr.exeLogonUI.exewinlogon.exedescription pid process Token: SeDebugPrivilege 2640 taskmgr.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeSecurityPrivilege 1732 winlogon.exe Token: SeBackupPrivilege 1732 winlogon.exe Token: SeSecurityPrivilege 1732 winlogon.exe Token: SeTcbPrivilege 1732 winlogon.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeSecurityPrivilege 1732 winlogon.exe Token: SeBackupPrivilege 1732 winlogon.exe Token: SeSecurityPrivilege 1732 winlogon.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeSecurityPrivilege 1732 winlogon.exe Token: SeBackupPrivilege 1732 winlogon.exe Token: SeSecurityPrivilege 1732 winlogon.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 2328 LogonUI.exe Token: SeShutdownPrivilege 1732 winlogon.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
Processes:
taskmgr.exepid process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe -
Suspicious use of SendNotifyMessage 43 IoCs
Processes:
taskmgr.exepid process 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe 2640 taskmgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
cmd.execsrss.exewinlogon.exedescription pid process target process PID 2424 wrote to memory of 2712 2424 cmd.exe rundll32.exe PID 2424 wrote to memory of 2712 2424 cmd.exe rundll32.exe PID 2424 wrote to memory of 2712 2424 cmd.exe rundll32.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1732 wrote to memory of 2328 1732 winlogon.exe LogonUI.exe PID 1732 wrote to memory of 2328 1732 winlogon.exe LogonUI.exe PID 1732 wrote to memory of 2328 1732 winlogon.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe PID 1808 wrote to memory of 2328 1808 csrss.exe LogonUI.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\chrome.dll.sig1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\chrome.dll.sig2⤵
- Modifies registry class
PID:2712
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2836
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2656
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2892
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1808
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1420