Analysis
-
max time kernel
31s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 19:43
Behavioral task
behavioral1
Sample
Jeep-Grand-Cherokee_2014_EN-CA_CA_65b1ac5165.pdf
Resource
win7-20240508-en
General
-
Target
Jeep-Grand-Cherokee_2014_EN-CA_CA_65b1ac5165.pdf
-
Size
8.9MB
-
MD5
65b1ac516558f6b26cfc53880f94f6fb
-
SHA1
ef1709a122b5afe70dcd0f76aa59426338f5d047
-
SHA256
0a9b0863a0ca18d8cf2d29b7bf09b0b72a4b2e414ddb604eee0740ba7acbe13e
-
SHA512
0199ae1623e68880478572c1d5c893d49d97f2255b49b78a6b074d391fc4c1ed48eee0931a942b723c7ae469ad23133a77788d64a7e828792ce1102baeb87335
-
SSDEEP
98304:InOCAETMRR/bsxABVCIfGyxcqh2SYu5pWwJxOwVLLSl0BXKedTrg587e:wvMjbEABkIfG4v2S15pWnwVnaedg5v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2836 chrome.exe 2836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1656 AcroRd32.exe 1656 AcroRd32.exe 1656 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2516 2836 chrome.exe 29 PID 2836 wrote to memory of 2516 2836 chrome.exe 29 PID 2836 wrote to memory of 2516 2836 chrome.exe 29 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2800 2836 chrome.exe 31 PID 2836 wrote to memory of 2812 2836 chrome.exe 32 PID 2836 wrote to memory of 2812 2836 chrome.exe 32 PID 2836 wrote to memory of 2812 2836 chrome.exe 32 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33 PID 2836 wrote to memory of 2840 2836 chrome.exe 33
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Jeep-Grand-Cherokee_2014_EN-CA_CA_65b1ac5165.pdf"1⤵
- Suspicious use of SetWindowsHookEx
PID:1656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c99758,0x7fef6c99768,0x7fef6c997782⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:22⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1340 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:22⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1408 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3392 --field-trial-handle=1192,i,638876705526161401,15835332121158293542,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5c2cc82f076a42a99666582b035ba1990
SHA101160273adf15c5162139a9b0dd2d6f4b4dffe45
SHA256b029cf110e9a1e88ba5f1df03e990f9e93beb6c1bf0f3e9ca265f00f920586bb
SHA5127a1dde93294bbe985372c1f971f3ac7b5386e88409e42f429a93909eff2594b25c4a10ae32cf832b13feea685c467c0e6f4167488976c63566098af851ef5709
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5f0c814605bfe06e002503fc7ddc0a1e4
SHA1ce44bd04837b980511c8e64c0b737fa362b078d5
SHA256430e6b6803ceaaa6a4fb7247623288a8df51f1f23fea856ff7ece7e1d4d56d93
SHA512fb92566a7a31386d759e65d533a20ed31d23b233568aac68cecbc837b1e73f0287e57588a9d124470c66c75cf27bd67fd6a4c8b2a928987a683559b2a94a1ab0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
140KB
MD5e1a7ba5d12312ad0e6b702b743ff9a06
SHA10f6e8d474997dc3fcbf6232e8a989c9103d70614
SHA2565c9d7db9f7d1173ea60417aa0ac09a5ab93ea2895a5137af9592fa89fb73f1b4
SHA51219594a02edada5e8a39c62b1eec762e196721776c899b8c34a3a16dd3e720eaf48e6ffacc778c8b9f1b251d4fcaf4ac43f46fca00f130e8b3206f7b6e34fc875
-
Filesize
3KB
MD50c261ef4bc2aa23faba39df989a8ae9c
SHA1238283a7ef9abe5cd5821bd10626a5a25c0dfe17
SHA25611b88c6d3f062ee1040423a5bcbba5a882701ee2ae1de739c3ba75db0cf1f921
SHA512de787323bfa10e7d20b3dc3f55b043499b529033c38fdc8a5b6b48091078f4bfcd4e76e3bd88d9cb55e34e4c42a9fb98b6008dbc1cbe2163cdf68e712433ea30