Analysis
-
max time kernel
28s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
BrowserMetrics-spare.pma
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BrowserMetrics-spare.pma
Resource
win10v2004-20240709-en
General
-
Target
BrowserMetrics-spare.pma
-
Size
4.0MB
-
MD5
b5cfa9d6c8febd618f91ac2843d50a1c
-
SHA1
2bccbd2f38f15c13eb7d5a89fd9d85f595e23bc3
-
SHA256
bb9f8df61474d25e71fa00722318cd387396ca1736605e1248821cc0de3d3af8
-
SHA512
bd273bf4e10ed6e305ecb7b781cb065545fce9be9f1e2968df22c3a98f82d719855aafe5ff303d14ea623a5c55e51e924e10033a92a7a6b07725d7e9692b74f5
-
SSDEEP
3::
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 chrome.exe 2712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2916 2596 cmd.exe 31 PID 2596 wrote to memory of 2916 2596 cmd.exe 31 PID 2596 wrote to memory of 2916 2596 cmd.exe 31 PID 2712 wrote to memory of 2484 2712 chrome.exe 33 PID 2712 wrote to memory of 2484 2712 chrome.exe 33 PID 2712 wrote to memory of 2484 2712 chrome.exe 33 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1484 2712 chrome.exe 35 PID 2712 wrote to memory of 1824 2712 chrome.exe 36 PID 2712 wrote to memory of 1824 2712 chrome.exe 36 PID 2712 wrote to memory of 1824 2712 chrome.exe 36 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37 PID 2712 wrote to memory of 840 2712 chrome.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BrowserMetrics-spare.pma1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BrowserMetrics-spare.pma2⤵
- Modifies registry class
PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefab29758,0x7fefab29768,0x7fefab297782⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:22⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3268 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:22⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3296 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:22⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2216 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3824 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3800 --field-trial-handle=1228,i,8925036604771909696,1881397236661666223,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
168B
MD5cd5469dbd172693c317cef6a5646e0ab
SHA1f8f5350b6ee09dc3e60a011fb4811721bfb43bc4
SHA25681c124d87398830eb5f1c2abd5faa25cffe44b90e53ce5f7db6848f004f17910
SHA512ecb40831977b3dc7c44a4ea1e0c21f82d94111e3f1cc5736669317ffa34bf0551aa1b5a49130cfbdc455abfc333d74636a544e14a128a397c8c5393ab7aee46d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5cf2eaa6001fbb9b499aaafa24173948f
SHA127c5d502bfee121e0632959bc4edb5a7359ace91
SHA25642e4ea6fb8ef0fe03f8e111195dc60d92ae6f1a38586b21b3c546fb9d2eadb2a
SHA512c487b22421d96df0d617861868e0537ffb7aa07fc0ce151296e8dd19bc35744f41c6df2fbcfc59f646bb8711f8b5598fbd5497dd751ec7ab00784b5beb6cd2a9
-
Filesize
4KB
MD5f194e4f5ac7a460763978ef013b53ba1
SHA1fb63120ae81ae39b208b9baa1269136cc91d6fda
SHA2566214886bca458c03b671ce3030f4a52c696a3c97b469aa49b4634e0fc53c4660
SHA5128945dc6558753bfd742bf5b17477e3574292f57ddbcb089fff7a18cc96600a923185e0f116f340e71616265343e8352136b243932c7a278c9b97a3f3c55c5794
-
Filesize
4KB
MD52a4181d4dd6f3383f17c0fdf254175e6
SHA1d8a28bdf4f76ee2c6815daacd6f4389dcd4cf6c5
SHA256eec08e33cfcf8e41aad88727d8d4dc420277e34880beed62e9d09c237d860c82
SHA51227f2e5aa15d15cac2464906ab5f7937333fccd98555801ac62857f71d5ebfd3adff54a44121767da35851e4a15c10da0e18f9d311f3b21cef1017e090fbcda0c
-
Filesize
4KB
MD52b1bb026b40aa7578d45d381d18bc20d
SHA1d40f31a74ab653bfe0a1b8211a0090e0d6437175
SHA2560bebc4381b79aa8167614af23e6f7cdf2a457a6953f1d371abdeb400646bed13
SHA5127c72a7698e9f58c40a6ff86b7ebba93b0a1d869fb09c18e023c401584c9c2ddf482fd90278e4d716ca6a5e55be9f40bf45758aa6fcee7be01968c99c3df08a25