Analysis
-
max time kernel
101s -
max time network
244s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 18:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.woff2
Resource
win7-20240705-en
General
-
Target
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.woff2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2764 2728 chrome.exe 30 PID 2728 wrote to memory of 2764 2728 chrome.exe 30 PID 2728 wrote to memory of 2764 2728 chrome.exe 30 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2756 2728 chrome.exe 32 PID 2728 wrote to memory of 2672 2728 chrome.exe 33 PID 2728 wrote to memory of 2672 2728 chrome.exe 33 PID 2728 wrote to memory of 2672 2728 chrome.exe 33 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 PID 2728 wrote to memory of 2616 2728 chrome.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.woff21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6aa9758,0x7fef6aa9768,0x7fef6aa97782⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:22⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2132 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2152 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3584 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3704 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1464 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:22⤵PID:1672
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\segoeui-light.woff22⤵
- Modifies registry class
PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3584 --field-trial-handle=1228,i,14059651560602320451,7835365557043096842,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5d0f474dbd3af1866977bd84962de286f
SHA174d09d6ea90fddc0e2c31b52c366d91062e57640
SHA25633640ee37fd825b9403be34e617bb178ccce002a3d12968b8837e71dff527b81
SHA5125a592f82dec04d1eafaab1b098080e6eac0d338073b5ed6ddea58b0e3343d4d76160c0c4572dcd9118e726336233480a885070ea22676a3c18259d5432b50703
-
Filesize
5KB
MD544f73a582c9aba69a6141dc2a40f4014
SHA16b20b3ed9940990b43a53094b086af33827319b2
SHA256fa0fd1c07af74aa9db3c7a6d42060a79d283c53716ded580c53b09ac8822a154
SHA5123a21334ccd10a257368ed7ccec57d6a05c931647755678c3bb0d47a0cbfed69645639b9ca10f7de023a83e1b7470bc20094240e3ec3cda149c8e9bbe6b117a97
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
28KB
MD5330e17beeeecee428dea32f39b679d3b
SHA10287e124b90084127ebd975d9f3fc92ebaaf53e2
SHA256d12e9086b74ef50e35760e4f40bd5411d1b2b657e33e4a09c5fc4861bebf0752
SHA5122d8f0d315a75527d5d198f09bd9cf685ccd2971960cb54ee4afb56be3ccdfb0afa757adc93ead412d6c975b4786ba8d0b10912ee4f23e4977528002bda6b4668