Resubmissions
09-08-2024 05:01
240809-fnls5axbjn 3Analysis
-
max time kernel
100s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
ThunderAimV2.04 - version-6fdcfe060c6440cd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ThunderAimV2.04 - version-6fdcfe060c6440cd.exe
Resource
win10v2004-20240802-en
General
-
Target
ThunderAimV2.04 - version-6fdcfe060c6440cd.exe
-
Size
1.3MB
-
MD5
56d757516c7563d515a8e5ff827a11bd
-
SHA1
2b73ff7ea3488e3009e21bd70a9df0b8de28a2fa
-
SHA256
43a1fce91f24121560b982cf6d9a069f6135194c001bec3e5e5744bf773693c7
-
SHA512
444ebfb4f416ef4fe88b49633eedf7bf2e3a58b755cdd7e36697816e126b43c85657916c46603ee323c4cc7df7df12e7c300b03fef6834dcdd0ea5091d6625a7
-
SSDEEP
24576:T2HveVC1okjzXiSDMCGZHcq3BgQYxoBLT+z20ASOKLnP7EBtdzAR7L17RA8nonhk:qD4DW6ez20RvP7EBttY7L1dchaQcmYD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2176 2216 chrome.exe 32 PID 2216 wrote to memory of 2176 2216 chrome.exe 32 PID 2216 wrote to memory of 2176 2216 chrome.exe 32 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2932 2216 chrome.exe 34 PID 2216 wrote to memory of 2800 2216 chrome.exe 35 PID 2216 wrote to memory of 2800 2216 chrome.exe 35 PID 2216 wrote to memory of 2800 2216 chrome.exe 35 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36 PID 2216 wrote to memory of 2752 2216 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ThunderAimV2.04 - version-6fdcfe060c6440cd.exe"C:\Users\Admin\AppData\Local\Temp\ThunderAimV2.04 - version-6fdcfe060c6440cd.exe"1⤵PID:2544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6589758,0x7fef6589768,0x7fef65897782⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:22⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2124 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:12⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:22⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1472 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:12⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1380,i,5776526047876329036,6679258710706163906,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5deca38ec13e284680404165a1ab5dff1
SHA18bbda352b921c6998d0fc136bb50b161930ccb93
SHA2565c5f84969c105c1f7ed85adb8329d90211700c8bb0b84653b916248f605c3de1
SHA512a8dec1877bc5994958e7c65a178860bda8897ca5822aa74554061ca5f77f0c301ac9b966bc17dc021255c400fccb73a3ef8f2510e27c70969f6db5c506f82cb3
-
Filesize
5KB
MD57996384f7dc629400fef6672a0c2ad33
SHA19a09b71c0f6946251353585716f77d6ff118d02f
SHA256ea3fe0f45f57d1e001313ae930214de4792a0469e4d0f8c1bea8d5b88770b7cc
SHA512446ee9eac02c465c5246d23584f0a0ad6421794ec289d0e56dd9c24d1dc1edf32dc7061f763998cd92adcfc479fa4f60939a27e2b1b6da4c4c663871e43c5691
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d5c3df36-89a5-45f4-b476-3f1f8ebdac14.tmp
Filesize5KB
MD5d9f7782b2ef60659cd052f5ae847d2a3
SHA1c66916d641f186e25ffac67e4e7f0a476283adf9
SHA256cdf446845752ce1af408e55b7d9c33a6a803adbb983dbd3704e3d0a691e02d99
SHA512cf95afd92cbc52eb73a086bf00b07118250c410370724defbb2362cc44568e4583c675b676722b445b777e0b479fc98278bac2e2f80901cc5d63bd3c727a35d3