Analysis
-
max time kernel
56s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
GeoPhotoService.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
GeoPhotoService.js
Resource
win10v2004-20240802-en
General
-
Target
GeoPhotoService.js
-
Size
351KB
-
MD5
ac074cb186db2bdb397a0d7c4f05ef81
-
SHA1
0fc9c3d9b8b72683f15e1f9cfb0863a14fafd0e5
-
SHA256
33bee24075e61fee3c71d2fb3916677725d3474d147c21c71884f4ed6a5f9786
-
SHA512
b740e777f53daf816800042cb42ece84cc0da47def9a7f2e4442d2d26cc6f6c8b1eddfa055c35ad3b3e9c0ac8955b43bbf9e143efd07a00c23d5b41287a6c285
-
SSDEEP
384:pbNAeTmfe718CrZ4elHtPIoAu+QZp0vLJ4bUzrLpboL4VixXRKbOEnjpwkO678W1:7BqBPgKAcixXRKCGan6vrcMrvuB+
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1736 2840 chrome.exe 31 PID 2840 wrote to memory of 1736 2840 chrome.exe 31 PID 2840 wrote to memory of 1736 2840 chrome.exe 31 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 572 2840 chrome.exe 33 PID 2840 wrote to memory of 992 2840 chrome.exe 34 PID 2840 wrote to memory of 992 2840 chrome.exe 34 PID 2840 wrote to memory of 992 2840 chrome.exe 34 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35 PID 2840 wrote to memory of 576 2840 chrome.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\GeoPhotoService.js1⤵PID:2780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67b9758,0x7fef67b9768,0x7fef67b97782⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:22⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:82⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:82⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1372 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:22⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1408 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3716 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1924 --field-trial-handle=1212,i,726846801007772017,8759075830840337949,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
168B
MD5f9c4ff62a518b3ca62485b40c7a7c97d
SHA118cc68f96ddd8576ae6bc503af0b0df2acef2d29
SHA256dcc7c12f510d484773c0134e8c32571b9ec053473816c353fc75171b961daeeb
SHA51250d08843ad663e36ac79ac693153f043cc38138fb2a302a2b2dbefde86288057d89def997c187bef5c0bc1048fbb201d7229a6ec6c818d1ca3c842851702cb07
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
361B
MD569f66595d239dfbda0c3a7723c29dd26
SHA15e465c08e8d69691afb28c1774a06d665c7eaa91
SHA256484bc360a92f5a77c0adb70b58aba33d38c3683f9d41bb19557f085c9f606bec
SHA5128e31f2e1a84a7058d734a742b2eaa6a945125641052a6defc26164606efa4fa7b968fc4ca2c37bd5ffdf05d6fd2a9603f9bcb1f322610ab6ce063bbc4388858c
-
Filesize
361B
MD523bbf0bc2ba37826310a9c0add3b9b86
SHA10ce1f1c0c5f1492158c40a15ee8df9b8d513c1ab
SHA256914bda87c22633ec8a7e5f7ad5675b38ee3d562e99c812917a18ef429aeecf62
SHA512d4764c635ea34cc5e5e576cadab6512dd8501382ecbaed7f5bd0f848470b744ec37f07f1bcc31d8d8d8b2a01ce71cc0c9432c8b37f4fbf150d98c7bb6a91345e
-
Filesize
6KB
MD594228642fab7cf802611596f1680bec8
SHA121b131091c40abab7ccc7348837572b0dd83a5df
SHA2561f28e3af2d2de4a2e6464f26b7ebef492c112bc7686c1b3d86cf2a14552cc303
SHA512aa7b52df2991c1621fd097666a062af0ac806eebcddd7c92f8a98e86ad6547d5c8c3aa8b4c57d3f0aa653eb05c80e1f71b0133429999bdc3fe9b2de6f0b75cd7
-
Filesize
6KB
MD5e8097c4c565809fc5f976a37765c094e
SHA1cefe089f8e81b7d5863335a4c0b2f2d7be0c455a
SHA2565875398066afc7816a490090103fe7a9cd6632da35ccd425990bc2cdbeae2366
SHA51209ae9cb231c8cfba26b7d35f544b45e36b91bee4d6dd5c16fe6bfa403d8fdfcd0aa9cd6681fcffe2740a1d69fc81a8549a444de48a2a70ceaf849eaf910db8f2
-
Filesize
5KB
MD5768dc6e2d6c29c58f825c0c85d842720
SHA1a0225c2892db294b07e6c034f6864d218901c8f7
SHA2564e400fc70624bc868e83344d09934af7f0220ae18405fbd8f717800cd390cc5f
SHA512189ea4f346f36ea79b5160b5e4f0176d74f2263d47a41ff013dc109019817453ea230ae45d1456ea6a5243bb01b8059d175492ff1f340c91079efe2b3b94b8e7
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58