Analysis
-
max time kernel
56s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
ro13qGC.mkv
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ro13qGC.mkv
Resource
win10v2004-20240802-en
General
-
Target
ro13qGC.mkv
-
Size
13.0MB
-
MD5
7ddbfad994abb7aed85659460dbb9d92
-
SHA1
9e3f3a3f2fe5622a7aa9b95e8fb4d3860e512206
-
SHA256
6f1e2a3540024b2ad90be4a5784cedcb8a7a5bb472a2b18dcca5259895b56a6d
-
SHA512
abbf9ca2fcec58c51d558a539192f17d8e15bbfc4194e96a114997592679fdd0cf52163c3904fc180197bb5ea1061513d760a715850a380bd15905e2a86bad66
-
SSDEEP
196608:jkiLx+3dh08VhTS2C8vJ0PcGKqu3YUkh+K8O+PkadRz0ZIPCV51DaYB5OJE+rCel:jkid+RTLE2za+GM7y0251DaYBoEmCdng
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2256 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2256 vlc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: 33 2256 vlc.exe Token: SeIncBasePriorityPrivilege 2256 vlc.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 2256 vlc.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1756 1664 chrome.exe 31 PID 1664 wrote to memory of 1756 1664 chrome.exe 31 PID 1664 wrote to memory of 1756 1664 chrome.exe 31 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 2176 1664 chrome.exe 33 PID 1664 wrote to memory of 1636 1664 chrome.exe 34 PID 1664 wrote to memory of 1636 1664 chrome.exe 34 PID 1664 wrote to memory of 1636 1664 chrome.exe 34 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35 PID 1664 wrote to memory of 2884 1664 chrome.exe 35
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\ro13qGC.mkv"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2256
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feeed89758,0x7feeed89768,0x7feeed897782⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:22⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2344 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:12⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1372 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:22⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3208 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3732 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:12⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2700 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2380 --field-trial-handle=1364,i,4266070910711837548,3059752741683754152,131072 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
987B
MD5d493c2fffffa5cc777c7a74d5197656b
SHA1222ab6dec0975ce6d87117b716488f13729ba92b
SHA256e43c63995f3a6262ce02d4e3c2e825d7747f91ffb123ef757e662a758794614d
SHA512e76edc7ae73f10b60aa627c7acfb1f36905f5ed08c2d61df9fa0c9d18f0a1f21a6a876ead56b63ea4ee5d146de8fadad164757f116bb76ad46f539c23dd486b3
-
Filesize
363B
MD5b6ee2804b83459f750a60db33f1f7cb3
SHA14c6aebee4feec641f56f95ac1e6b105097a6af41
SHA256905de2529a47c5b392fe299c11c3de747ecb887b8c4f8125aa9b0eb0d57a1a5c
SHA512c59f04656bac32299e5f449c8a307a4859d231162be2e618a4890b3fb9d301f1e13ae1574f24f8965bc2dfd5e06e0d8aa63126f3d2678a19a98aa670613e95f7
-
Filesize
4KB
MD564a2a9a94d15db206f0925b717d3abc0
SHA1d18657c5a9564104d7a3dd643ae65f73bbc4f9dc
SHA2564878fef5224db5eb0051669d330bf57481b42e595aa845eaebc621c7f083db1d
SHA5129d2c13441d6d76522038e8d316d1146e065d2d796c72ae602fd6b8e73a9094a2ce94eb22406b1deb08ff5980cabb2552d84f72ca737fde83db961fb4fddb3340
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
311KB
MD5c0e6aad1839223e3d4faefe475bce7cf
SHA1d12cb7684a6c21d4e75f0f5b65bc6ddd61a9a08e
SHA256bfb87b994baeac916d6f0aa7593cda5e4724103b554329fb7d4d558eb57464d9
SHA512cf3252169baa7c916172bca308397b2ab5e81147894880119df6e9a990f2bec0510395c21b7d7c84adc5b2e34245a4d5a1544473693f685f9da1e71118bb4d3e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
311KB
MD573554449122bf90d110512514942451d
SHA124e4eaf2478a301e3bfca599468e1b4931801161
SHA2564f761b479cb0f0248237ce448b09476c6fc1eec926c584086b0377d60fe69cf8
SHA51258d1a7f1376923c31492efe5f034fb7b3877168b441e29b8166d4361c17b291a8874b9a802416e058521cd6a32bfdb8054e62885232aabaa329983a93bc82b84