Resubmissions
05-08-2024 23:21
240805-3b848asapr 105-08-2024 23:18
240805-3ajsyasalq 105-08-2024 23:15
240805-28nn4s1hpp 105-08-2024 23:12
240805-26xh8s1hkk 3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
42.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42.zip
Resource
win10v2004-20240802-en
General
-
Target
42.zip
-
Size
41KB
-
MD5
1df9a18b18332f153918030b7b516615
-
SHA1
6c42c62696616b72bbfc88a4be4ead57aa7bc503
-
SHA256
bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
-
SHA512
6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
SSDEEP
768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673732507475102" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeManageVolumePrivilege 1504 svchost.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3676 3160 chrome.exe 100 PID 3160 wrote to memory of 3676 3160 chrome.exe 100 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 4776 3160 chrome.exe 101 PID 3160 wrote to memory of 1400 3160 chrome.exe 102 PID 3160 wrote to memory of 1400 3160 chrome.exe 102 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103 PID 3160 wrote to memory of 556 3160 chrome.exe 103
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\42.zip1⤵PID:2980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fffabcccc40,0x7fffabcccc4c,0x7fffabcccc582⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2236,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2244 /prefetch:32⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3796,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4824,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4848,i,12959855138598752306,1164673840443245534,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5190b97888eb67c9c0e76ca570e292feb
SHA18eafdde63e1b2b031c764bce24e4297bea0cf55c
SHA256a961cfbe73be4b5e0bef1d50589822d6041d10c7bb0f37e245a8d64000dc5168
SHA51254d9e775c4ae05c01b1c9d8fdedb0164d6a8663bcce82202c3c9b4da59f7f9019ed50f359a605d219434f483cc1bb446c2b3d47048e76ce4b6b726e1d9154699
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5d7f0ac7c55b2b3e68f713cfa380542c6
SHA1a4d7d3c0386638a9eb82b83c8bf43d1916b36d48
SHA25634e4deb185273f4165e5397640f5d5e3737fd36ff3234b02679ac7dcecf80c2f
SHA512e093db630b997e5dd896cd521ebb19eae9d0c1ddcae5019b22f1167db240f73179cf91a772bc1f7cf74bffcc5363ef3ddd91c1e0974aef07f45e435da871a0e5
-
Filesize
8KB
MD5f6948c64592640a6cd9cc216bc095033
SHA168884057b4c4fca63d196538355bd8560a457878
SHA256dd5bb8523fd723bb9943d1ad95b4cd8964bafa54ecaac82006de81f418a2d00c
SHA5129347056cdab94870cf9c4e9ff6202912b424082fc326bcd6a9c1407c8fab5d6babaad3ac3cc769192ef19a8745a7d5185d6cc268d98a6923b6f79cd38898ca71
-
Filesize
8KB
MD5f08729e1ecc5a919074e402e94465133
SHA1cfc073f6da1fb2330de61265774791b4fbf2365f
SHA2563291df59c07d186f95f00d95b2e20d239bba7a4992f760ebebf770c0c372048f
SHA5120210ea4837a9fde91f3f32a268bf7de1703be0a73a86cb2592131394e8d4cd9c49175b9a711e44f3c6879834f12c1f1cbc376f9407d2fe0384268cbd61f6a740
-
Filesize
8KB
MD54a180cc063076b5ee41142e7a6fac37b
SHA1d5769972235e724861f3d0422c5abb374c4905f8
SHA2560e2b39978bd30d2fe744698b4450e2d31ad66d5eb20a40a5ef102511350e3b9c
SHA5126703434e07a7a7b92a8bca41b404275988f23e2d4bdc2224926d28b780c434ce31964d5b735e32ef862a9ac8e98ca93f2be54d1a7ab071a7813265716af34a9c
-
Filesize
15KB
MD591125ff0d9dfb93ba173d8c8729bfb70
SHA17c8099a27326ee95c47b4e854c84686d9b6b91d3
SHA256afa297b07ec357569f187ac6dfb2e38deb140775937b54f2974bfec4d425ba59
SHA512598473ae81f1b42847ba15104c4209948bdb443e89ecfe3db4a29577fea0c2f5fb23b76fe9f096334aa4567e87ff064eb4126db5fcea04752b59e8c6782e7ad7
-
Filesize
195KB
MD5d3e0ff3c5dc6bb285c7bc01e820735ce
SHA14af7de9a9a22246789b6f754b267c1fd5cfea804
SHA256222affe169de2d26e085c7690e4cc1b672358d42a21a70e8b7109002c12cce25
SHA512a83049f7b89e98cf8d5a489446ba77a540e9a1367a722c565a0f0dfbba8dec2f03dffdceb9ea748f61df61d82f748bc9db7a2638b61a15ef4a02181a2b0883e1
-
Filesize
195KB
MD51a9af018608d44f3f866e6e1f7200d0a
SHA164794ab7eb79908060e12cf05cebd31742363471
SHA256d17266a76d0caf7b239ae059caf1e3f5e907ca99eb4761889d95b89527bab12c
SHA512ad9b93b4a7926c1284357ee0e89b893983c546959ed89e6a4839ef1a490e1e4b3f4e2d24771bbd2902408d636c8f774e672d10ffbef917294d6db76e354fee5d