Analysis
-
max time kernel
8s -
max time network
10s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/07/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
BoostFPS.vbs
Resource
win11-20240704-en
General
-
Target
BoostFPS.vbs
-
Size
180B
-
MD5
5472d0861300b5e5316e1760c97c6f59
-
SHA1
bc2fb88907527cc26c34517f98906a9fc714acf9
-
SHA256
fd5379ed4a55486871aff47395496818419cecd97580cdfeb3642684c9af65ef
-
SHA512
aec8404cb420826bccdeb1f6e240c9713888e4e1ecbd5f2fe7bcc38bb66ea0f57be726e29b0e02541fb7168c58cd42f0f7b424c58a194048c63ceddb43395ce0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3408 2512 chrome.exe 81 PID 2512 wrote to memory of 3408 2512 chrome.exe 81 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 5064 2512 chrome.exe 82 PID 2512 wrote to memory of 4536 2512 chrome.exe 83 PID 2512 wrote to memory of 4536 2512 chrome.exe 83 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84 PID 2512 wrote to memory of 3096 2512 chrome.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\BoostFPS.vbs"1⤵PID:2132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffb6ebfab58,0x7ffb6ebfab68,0x7ffb6ebfab782⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1828,i,5565964637123609069,15269089315885975992,131072 /prefetch:22⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1828,i,5565964637123609069,15269089315885975992,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1828,i,5565964637123609069,15269089315885975992,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1828,i,5565964637123609069,15269089315885975992,131072 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1828,i,5565964637123609069,15269089315885975992,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4312 --field-trial-handle=1828,i,5565964637123609069,15269089315885975992,131072 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD547b9fc2a4761db7198e6aed491747273
SHA1dad7ca9f538c535cc46aae7ea48ca32c80e5975c
SHA25690764b4d32956cf3bcb18190ee93cd974b73fb7e50c4886ae64fdcb2340699eb
SHA51262320d6562124104824590ca3e02893108e48ed60933ed77bab3713d38cf02b80b548757346afc12713a89406abc82ae779165fea7c0b95859253c22cf387eed
-
Filesize
1KB
MD512f3c19bb51af1311c2a6a1991b458d5
SHA1cf48768aeaf7f915f2ab3aa0d4f807d33fa30864
SHA256680be2d927a47cded6ddb155b69e264bc6c59e73e1a619bc9ed9e27e4897a3d4
SHA512a3efaf85ea1c043701224f1c2de1deeca97a3e68849f8c48b267cce0a2b3edf6f0b20d47672186cebaafdcbc47a5f088eb9b705d7e184c0c6ecae152ddb39b97
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c59cfd2838609b63f88ce38e3cfcbaf9
SHA1f3bd379f192a6f251e8c30f8c35f6c464f5881f8
SHA25668e88a58f6d237ecf88e7de85d44e71b361a53b1ac5518c8578464d847a2a749
SHA512560cfdd2aafc4fa5d91b3208d3da6e3dbcb7241a353c53c591bb4186d2e0982a458f9fff8c63772c01d1eb134ef6bb1ca5c842f5b36aa091d72e04775cf5da20
-
Filesize
6KB
MD5d9baa51165b872087effcbb1a2996721
SHA157557a829c01ffe3714128ca8aa516252a2f573f
SHA25679a866a2d3ae918be8e60a9197121774032f0fff2a2beef8ccb6fdfced274c3c
SHA5124d5623dc91f0da3067d55cc693dd7b5d672c43fc0443cbf941c2c26d0be64db56dd99786ad515e7861a05323cc45422801564c9b3ef941d72548c0f65ce03504
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58