Analysis
-
max time kernel
103s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
SG9uZXlwb3Q.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
SG9uZXlwb3Q.exe
Resource
win10v2004-20240802-en
General
-
Target
SG9uZXlwb3Q.exe
-
Size
1.9MB
-
MD5
4068c0803b559c904b34b910d8d9ef86
-
SHA1
e2cc27330b08ccf77a2affb4d60866d8fc3e3f9b
-
SHA256
70dabd28c39071fb7ec71ef07a604d8a7388af14a23f1ed7a14868986fb2d70d
-
SHA512
87d9907a284202b0cf3383810593ed66775fd695aa43793a185e1e23ce611336e9936b27a4b387b36a47c8659c75d4a217a7f2d4498b1e42170d0109292825c7
-
SSDEEP
24576:Y5lYe0j3Z6o2GEr8RgE9QRhAmnjtVLFFAVWtOwjV3SFDFnN65qsyHiPOMXB8sN/w:REoTgYyU1zaCXDXFWGebMYZzCvpp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe 2376 SG9uZXlwb3Q.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2616 2644 chrome.exe 32 PID 2644 wrote to memory of 2616 2644 chrome.exe 32 PID 2644 wrote to memory of 2616 2644 chrome.exe 32 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 2612 2644 chrome.exe 34 PID 2644 wrote to memory of 3016 2644 chrome.exe 35 PID 2644 wrote to memory of 3016 2644 chrome.exe 35 PID 2644 wrote to memory of 3016 2644 chrome.exe 35 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36 PID 2644 wrote to memory of 2108 2644 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\SG9uZXlwb3Q.exe"C:\Users\Admin\AppData\Local\Temp\SG9uZXlwb3Q.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5989758,0x7fef5989768,0x7fef59897782⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:22⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:82⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2112 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2216 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1296 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:22⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2852 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2652 --field-trial-handle=1184,i,3302429428091442379,2988084553110342801,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD55fa142406f58aa23a9cd6374ca3d7d90
SHA10fdf733527209657e27d925d27a48a6851890e5e
SHA256e9775e4a55c056af8c1cec1f14754aa29f0addcf4de2876e8e52e27498f516cf
SHA5121da91162926ffa47ded934d330e40a56f1235e2a2483f5dc756784991263cdf17b7d1bcb7c327ec407b05bd75679600ae745a7d5ea3d32f3a6e0f64a6e392647
-
Filesize
4KB
MD57d2a85089271b1144e14caf8ae17cc42
SHA1128987099a3c6bfa20aa80814722f0ae36696807
SHA2567991e1fa29c031257a9f9c741578de118abc28c6288848423c845794f991e7db
SHA51233c3c2252ae1b162395919fe640bbbb83aa0f2efa6e816cf166b6f05731294d2f8c6c9c030523270328cc2ba2217be1f31b8afe25a547f3c67b279c9ff35a7f0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2