Analysis
-
max time kernel
81s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
[vavilon.vip] [Skillbox] Здоровая самооценка.zip.torrent
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
[vavilon.vip] [Skillbox] Здоровая самооценка.zip.torrent
Resource
win10v2004-20240709-en
General
-
Target
[vavilon.vip] [Skillbox] Здоровая самооценка.zip.torrent
-
Size
141KB
-
MD5
07a04e3a445f3491672a71392577c0f9
-
SHA1
a6295b119113f58ae999206f95392671ad4e9762
-
SHA256
6539b6d7c7bcb1a8694692ea3007e2fc456d48381844c5357b5dd0947f501e34
-
SHA512
ff681ab71bb98860f25d7a8ff02620bd95649d5cb99af3ea2b5c3f86fc8dae4db60c04be59223d4d88ff04c6908c55f39b380309646111c6fa9d74a22280faf8
-
SSDEEP
3072:6sX4d/NGF+Ydb6wuEob/84Hjy1PC9kOaDi+h4pu0EJfUTh3drIH4xM:EdsvIwudb/dHj39kOaDpuEJfyh3RI3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661640690992461" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 912 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe 912 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4308 1856 chrome.exe 106 PID 1856 wrote to memory of 4308 1856 chrome.exe 106 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 3908 1856 chrome.exe 107 PID 1856 wrote to memory of 4812 1856 chrome.exe 108 PID 1856 wrote to memory of 4812 1856 chrome.exe 108 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109 PID 1856 wrote to memory of 4548 1856 chrome.exe 109
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\[vavilon.vip] [Skillbox] Здоровая самооценка.zip.torrent"1⤵
- Modifies registry class
PID:376
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff86824cc40,0x7ff86824cc4c,0x7ff86824cc582⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,15141786367435933314,7895647749742875569,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f3aa1da18514e5b9e9a34b6d2adee8f2
SHA17ad3ce5e6f41ca037999fdaec454c6749fb0a47e
SHA256d5162a7d7bf285ce83d7086ae2ba0f5f6d3ecad7b05d390cbba77ba625287829
SHA512650b32f857fc9f54994be08cb46b22c79b19206539ade8c36ce34786622608b453f641ee651def42f1be2b4801f8fd4fa766f56649a2a74ff566d2d8c1152ffe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD51accc5419c162519f5f7dc3af2dcbd9a
SHA10065e5493e5f53eb12edcdd3d38e8406e71d2994
SHA25658e0b78e8b7e57099a798a99db4659e9c845c603469f78bbdeae4b783caf803d
SHA512f5282ef5599ed94cb0602e7258355eb0c0506421aac6dd0d8064e69671f1460b19f35faa1b3df0fbdaf57a603b2d1e9ad25a8d27c6856b0d14a30a668db58789
-
Filesize
8KB
MD5b2700fd0c3fdacbb4a804e6cf46c8550
SHA186143871700223838a7da1575f3d953acb72311e
SHA2566949f073d4c19d1febf56292fbe67910cc12439df660c3923dc5f5ccb4a7d054
SHA5128c06131d3fec17846a64ea364e7a93f63604d362658502ca9c5e195d1abce3f63370dc2af1e118c1f7debe5edbbe6ecfeb26d316db6d7b008f1142427346fda6
-
Filesize
185KB
MD562bfc975c52361db18548afe8365f442
SHA14a27d3d7aa5cf98a551050ecd5693c52d68c12d9
SHA256107dcda1f894af1d016e5140871ccc4976b01edac3a3a4a1b70f3e0be7ad4adf
SHA512024ad4da253ef44472e0d7b673c3aa2d1bf507522aadb6bed060cc1757a77c432b0ec4d97322e2c81705ebf2d00b78bbb2f0abb238cd6ee7fdeb2a7c23595625