Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 18:17
Behavioral task
behavioral1
Sample
PCPS.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
PCPS.exe
Resource
win10v2004-20240611-en
General
-
Target
PCPS.exe
-
Size
2.8MB
-
MD5
483da837d70e72105520ea82033c49ff
-
SHA1
4339212b959c1ead23bb5cc31dcf12736ee3e1d4
-
SHA256
d9f553bfe5254e734f2c687a69d9a61f082b87c74fc03af1a51dff715a6d7e9d
-
SHA512
1501cef6c13fd7285749b27ff1f1cb7bcbd4e75543eb3b3d78da649c3603028731b361a24d724d68dc41737e550ac826baf829806a69d7a90366e1768a58d23f
-
SSDEEP
49152:B3+xTCM1oVeG0kGj/esU462SJJm0tjRU+hT9Lgr84zMG8qK7kyjF3U4RRGef++fd:BLGefGh
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
PCPS.exepid Process 1732 PCPS.exe 1732 PCPS.exe 1732 PCPS.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2584 1732 WerFault.exe 27 -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 1908 chrome.exe 1908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PCPS.exechrome.exedescription pid Process procid_target PID 1732 wrote to memory of 2584 1732 PCPS.exe 28 PID 1732 wrote to memory of 2584 1732 PCPS.exe 28 PID 1732 wrote to memory of 2584 1732 PCPS.exe 28 PID 1732 wrote to memory of 2584 1732 PCPS.exe 28 PID 1908 wrote to memory of 2692 1908 chrome.exe 30 PID 1908 wrote to memory of 2692 1908 chrome.exe 30 PID 1908 wrote to memory of 2692 1908 chrome.exe 30 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2492 1908 chrome.exe 32 PID 1908 wrote to memory of 2508 1908 chrome.exe 33 PID 1908 wrote to memory of 2508 1908 chrome.exe 33 PID 1908 wrote to memory of 2508 1908 chrome.exe 33 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34 PID 1908 wrote to memory of 2660 1908 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCPS.exe"C:\Users\Admin\AppData\Local\Temp\PCPS.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 6922⤵
- Program crash
PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c79758,0x7fef6c79768,0x7fef6c797782⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:22⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1596 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:12⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2848 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:22⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1392 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2132
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f417688,0x13f417698,0x13f4176a83⤵PID:2844
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3340 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3084 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2468 --field-trial-handle=1244,i,13021613882360198140,3125381962270488951,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD57e10d8389c0d31fbb5b277dfdca7eba7
SHA1453777ad191b66ccbec704e47254c9e98f7ec108
SHA256dba1046c3ce30b4717f0a38b72671ee8007024393e348ed56f0d8b98702d39c7
SHA51238c7e49c1b6435735df38a5cc87c035151702024a898ff88dd26ee4e38bb090fc2297534cb37bdb6fe770b4e6422bef87166781e0848247ad6d4c229b45ecaa5
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD58cf48d3b367428eb9d08fab62466ad85
SHA13e8c6ec212f890b3b8c5ed31d1bfd3fced3c407b
SHA2564f031a8864a96ac767e998ce6a257654233379e0b5d6ba5b95d653da8b6e2ee0
SHA51243de4e0c8b61cbc6f2d19ca4fc9397b2fd0c934ca92e8f62eaf55802917b2576e7b221442bb2a6ae429d17abe63d102146219b96533860010c4d506cb836c681
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
140KB
MD5ad8ea3b81e8a44cd4df85fd57635dece
SHA14958857846d0382cc8b38d46da329d6cf9c5f7f1
SHA2566ea4d7e063bbf5f1c01366a11ee17ee42643e7b92b51109a97905557a6e398d9
SHA5129ad9d3f2c96c3040f7e82b0c057a70f02ab23a48fbc7c4025fe79479f75246c1eaa2abfb0f9e6707df167f2633660c787c7a30f015120ab53e0856f045599376
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
69KB
MD545fa4315c7631b828e2871db89b3df27
SHA1f34f3a5344abbb67a21348be9eaeba7831c7333e
SHA256e580ca9c0382a8663d6bdff6e53802bd73fa8a71689d7f38521ca02269775a58
SHA5121dd74a83b0435674d61e0e752e3d671334970fd7d235203faf1791c67965eee2324a7dd18e03be575138d3c3639d106534a084c3f9a78d37ff4ff77ead4cfd96