Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
66a2d9a797a53dfee20c2ed6819d0627.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66a2d9a797a53dfee20c2ed6819d0627.exe
Resource
win10v2004-20240508-en
General
-
Target
66a2d9a797a53dfee20c2ed6819d0627.exe
-
Size
5.8MB
-
MD5
66a2d9a797a53dfee20c2ed6819d0627
-
SHA1
9a445dced06aa1702f2971179990b3ddbfa4f681
-
SHA256
16fac30777000a16e64573623673640b70003119b3a7e65420e1208e08f30040
-
SHA512
ca69d30098d567eb7b40247f2688a617fc84e019da6294b245fdfca2e1c3ec0d9229cb6466f10e0239615fefd1c685cc0fbc170f9fc0ef4110ffa51195106235
-
SSDEEP
49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfj:63CE/Xx4LKhdkZESp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3176 ChromeUpdateTaskMachinCore.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe 66a2d9a797a53dfee20c2ed6819d0627.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 66a2d9a797a53dfee20c2ed6819d0627.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 66a2d9a797a53dfee20c2ed6819d0627.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 66a2d9a797a53dfee20c2ed6819d0627.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4828 66a2d9a797a53dfee20c2ed6819d0627.exe 4828 66a2d9a797a53dfee20c2ed6819d0627.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4520 4828 66a2d9a797a53dfee20c2ed6819d0627.exe 81 PID 4828 wrote to memory of 4520 4828 66a2d9a797a53dfee20c2ed6819d0627.exe 81 PID 4828 wrote to memory of 2840 4828 66a2d9a797a53dfee20c2ed6819d0627.exe 83 PID 4828 wrote to memory of 2840 4828 66a2d9a797a53dfee20c2ed6819d0627.exe 83 PID 2840 wrote to memory of 3176 2840 cmd.exe 85 PID 2840 wrote to memory of 3176 2840 cmd.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a2d9a797a53dfee20c2ed6819d0627.exe"C:\Users\Admin\AppData\Local\Temp\66a2d9a797a53dfee20c2ed6819d0627.exe"1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\system32\schtasks.exeC:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\eGIMc /F /TN ChromeUpdateTaskMachinCore2⤵
- Scheduled Task/Job: Scheduled Task
PID:4520
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"3⤵
- Executes dropped EXE
PID:3176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD507401a393124e00e35d3014b854eaa8e
SHA130606ced9ee070dbade8f2b91ca21d0fb7da45c2
SHA256a944a1f12474a7fb2dba70bc25d747c6c04a466208be8934dd91307dd4f9d204
SHA512b9713595ebfb8dbf8ad7c3cb1590f6776d72fbb2b94e4eb1735f7d9bc0f6c818a8a02b9298833550445265085389ebe7901eb0a39635c2333eb989fde25ab772
-
Filesize
1KB
MD51bf5076d24d2bd9b2cea3d950f844a7a
SHA1dbb1be5ccc66b7ef0792d35a95a93a1a17b1e636
SHA256d79f2b872feb31a25f8c922621ef3f1342f800a54cd89acb62b9c72e2b2f1da1
SHA5127a1ac5dc0eb4262c9a576cc72e311705c1f90771e4814faae033bf7001837cfd5e11387de548d6a1d6b63801153d5836c10a9d2e4eb0c9b382aa5d3aecc1209c