Analysis
-
max time kernel
187s -
max time network
485s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 08:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-8
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-8
Resource
win10-20240404-en
General
-
Target
https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2008 2528 chrome.exe 30 PID 2528 wrote to memory of 2008 2528 chrome.exe 30 PID 2528 wrote to memory of 2008 2528 chrome.exe 30 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2908 2528 chrome.exe 32 PID 2528 wrote to memory of 2964 2528 chrome.exe 33 PID 2528 wrote to memory of 2964 2528 chrome.exe 33 PID 2528 wrote to memory of 2964 2528 chrome.exe 33 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34 PID 2528 wrote to memory of 2648 2528 chrome.exe 34
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-81⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70e9758,0x7fef70e9768,0x7fef70e97782⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:22⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1400 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1476 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:82⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1792 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:22⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3188 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 --field-trial-handle=1776,i,15206174270023796271,8702336598069592126,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
1KB
MD5383c933235d37d9d5fd9ab8d6d66f927
SHA19b0045332b58b965b02d126b969b8a8d5e8982cb
SHA256c5b2755434ab8e9528156a42f43a22c120510122e219628bfa8d1837de3c01f3
SHA512d7be84e61dc03aadb6f1ec5bf7aaf0dfdcf95bf1693d034905e516120e9811a16c752e9d53b02f92cf3d520f571fec5195269f379c4b776b54393273d9403501
-
Filesize
1KB
MD5737d57f19f43b30f9a48fa9527363d10
SHA13991b487ad84e27e7e128eed3fa54bd19fa39c3d
SHA25645f7305c83ecb965ce5c0c87b71a39b6494be2463c49e431a0a11657939ecd73
SHA5120f37b6ae2351194f62fee7e2704f3bb3ad6e016f4114849d06dfceb7085ac89cfe6dc557fb8606c7012c200c13e32ee7d4539bf1250189323b696a5e0a35c7cf
-
Filesize
5KB
MD506ee7531f1cb9b1c03741dadde0804d4
SHA1a65d4b53e72b6f3510173288f6ed31dac58aa21e
SHA25612dab51f34be88fd10878dd010276b531aa9556419680f2ef7c8bc6c8027f83a
SHA5120535864735d7a7e721e080c1beac0ac8d48d69549fc52689383d751f2b4c5e325a947968aed875a622e8e84bd4c8c81963971e11f53c1d81c353ef2870f3d55d
-
Filesize
5KB
MD5feeb83e750ee133e23c859cf4ca366c1
SHA1a846aa1f3bcc281e4d993ce5c5debc4a70aff59d
SHA256a4fb827ef781a71d2a8e0c8467dfe2f23b2e7dd94989b78ae57184c430bc6bc6
SHA512b911cf7d664a2ee2b2919549fe98ec2a5eea439cbc7a7de64c89ead9566cf5324e5405221f0bfabe2b4b9269930f1332193b97c66aefbe73ebe5ad501baab219
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58