Resubmissions
Analysis
-
max time kernel
1s -
max time network
370s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 08:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://assurancevalenciennes.fr/wp-includes/assets/loader-packages.php
Resource
win7-20240221-en
General
-
Target
https://assurancevalenciennes.fr/wp-includes/assets/loader-packages.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2240 1752 chrome.exe 28 PID 1752 wrote to memory of 2240 1752 chrome.exe 28 PID 1752 wrote to memory of 2240 1752 chrome.exe 28 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2040 1752 chrome.exe 30 PID 1752 wrote to memory of 2716 1752 chrome.exe 31 PID 1752 wrote to memory of 2716 1752 chrome.exe 31 PID 1752 wrote to memory of 2716 1752 chrome.exe 31 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32 PID 1752 wrote to memory of 2480 1752 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://assurancevalenciennes.fr/wp-includes/assets/loader-packages.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7379758,0x7fef7379768,0x7fef73797782⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:22⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:22⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=852 --field-trial-handle=1220,i,17884117480007159979,983719047094409589,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:1352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x9c,0xa0,0xa4,0x6c,0xa8,0x7fef7379758,0x7fef7379768,0x7fef73797782⤵PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02c4aa467993a69ebea600755d2d646
SHA17a77ce528fbcdf59351e671aee4f6319f86f2dc1
SHA2563fb1cf055c885bbbd0dbb90499364d80cd596023863d959090f3bf226edc1392
SHA5126adcf6f627cb19ad77588b95191011687bdc9527c8d5e7bc591a6926ca252ea430148afdcda9e91c5bb86a076527d0769ae9a69bf459b4e546123f3d6a9278ab
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD5c264105c32ab137ed9b3a6fe3c3b082f
SHA1d6db4d7e67dfa7566e6ec2177c67aa78b3b91a3e
SHA25669cebf20b0325190f17e71a41d5d819cec7e5760c81ba185be6e2036bca9cdfd
SHA512914fdd3d5080c34f95b1fd79ce02cc01e0ac91c51a215c2b24b8598180cc472d5a6dfad5166475211b8737e80595d6d6a34f6f3a035055a334dd2041852611ab
-
Filesize
6KB
MD5c0bc6001e5d37678b9b0e25d4592d176
SHA15adac6d0421d08a0736cd37d45a80e4facf29ff4
SHA256b58678695da61212143a77520417f4ac1a412d144416781b0a2e87af742aef85
SHA5126d5ba6127b2e637ab7509f181e71168db8c62c0a44ba75ffb6ae22c685292657698ffa09e5b0412cf135001159dc5d55b7098012cc9809d780a26acb07d349cd
-
Filesize
6KB
MD52c3a76eda89be7f00a059fad8712bca7
SHA107dd930efadfdb5e407527b2f955b504e33fea7d
SHA25664d20cc6eff542f280d8bee44138dfc6aa137695f061558f4f66f9e5b4d64129
SHA512602a6f938ba6361b4ac8305d116b0307d9ecb03a7747f9ef7ec4d87c913202c75cc9a623cd86d9c8b779037b996723693a0a7fc834e16fde3a832515ff3498e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b