Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24/06/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
GoogleChrome.exe
Resource
win10-20240404-en
General
-
Target
GoogleChrome.exe
-
Size
144KB
-
MD5
df5980a386f4a2dd53bc520b9ace88e9
-
SHA1
f5a137303395054c1b0fbfb9981bb766bc32a0ca
-
SHA256
c06f047322178fea3838d66d52658bbd14efe4a9e6ce61bc0638ab4af517c0ad
-
SHA512
980ff5cdc854ce765b735989777129bc424f0c9c868bf8d70cb6be94f8541fb5c54e834853e3943c989a5c2f915670094019998ef60cde5d5d3effdcc3b7711b
-
SSDEEP
1536:R2Y0VNblnigen1FQGpaika1PASjg/o4R3AvKJY4:R23rbZi/8GprF3jg/o6wgL
Malware Config
Signatures
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 3056 cmd.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 600 wrote to memory of 4948 600 GoogleChrome.exe 73 PID 600 wrote to memory of 4948 600 GoogleChrome.exe 73 PID 600 wrote to memory of 4948 600 GoogleChrome.exe 73 PID 4948 wrote to memory of 3164 4948 cmd.exe 74 PID 4948 wrote to memory of 3164 4948 cmd.exe 74 PID 4948 wrote to memory of 3164 4948 cmd.exe 74 PID 600 wrote to memory of 876 600 GoogleChrome.exe 75 PID 600 wrote to memory of 876 600 GoogleChrome.exe 75 PID 600 wrote to memory of 876 600 GoogleChrome.exe 75 PID 600 wrote to memory of 4624 600 GoogleChrome.exe 76 PID 600 wrote to memory of 4624 600 GoogleChrome.exe 76 PID 600 wrote to memory of 4624 600 GoogleChrome.exe 76 PID 600 wrote to memory of 4700 600 GoogleChrome.exe 77 PID 600 wrote to memory of 4700 600 GoogleChrome.exe 77 PID 600 wrote to memory of 4700 600 GoogleChrome.exe 77 PID 600 wrote to memory of 3056 600 GoogleChrome.exe 78 PID 600 wrote to memory of 3056 600 GoogleChrome.exe 78 PID 600 wrote to memory of 3056 600 GoogleChrome.exe 78 PID 3056 wrote to memory of 3952 3056 cmd.exe 79 PID 3056 wrote to memory of 3952 3056 cmd.exe 79 PID 3056 wrote to memory of 3952 3056 cmd.exe 79 PID 600 wrote to memory of 1972 600 GoogleChrome.exe 80 PID 600 wrote to memory of 1972 600 GoogleChrome.exe 80 PID 600 wrote to memory of 1972 600 GoogleChrome.exe 80 PID 600 wrote to memory of 1288 600 GoogleChrome.exe 81 PID 600 wrote to memory of 1288 600 GoogleChrome.exe 81 PID 600 wrote to memory of 1288 600 GoogleChrome.exe 81 PID 600 wrote to memory of 4672 600 GoogleChrome.exe 82 PID 600 wrote to memory of 4672 600 GoogleChrome.exe 82 PID 600 wrote to memory of 4672 600 GoogleChrome.exe 82 PID 600 wrote to memory of 4704 600 GoogleChrome.exe 83 PID 600 wrote to memory of 4704 600 GoogleChrome.exe 83 PID 600 wrote to memory of 4704 600 GoogleChrome.exe 83 PID 600 wrote to memory of 3092 600 GoogleChrome.exe 84 PID 600 wrote to memory of 3092 600 GoogleChrome.exe 84 PID 600 wrote to memory of 3092 600 GoogleChrome.exe 84 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3952 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GoogleChrome.exe"C:\Users\Admin\AppData\Local\Temp\GoogleChrome.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:3164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Window Title2⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:4700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:1288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74