Analysis
-
max time kernel
124s -
max time network
286s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
external.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
external.exe
Resource
win10v2004-20240802-en
General
-
Target
external.exe
-
Size
957KB
-
MD5
5317bb0166889901e5f05eb7694a87eb
-
SHA1
df0d88d01787371580f20ffdb32882154c418f0b
-
SHA256
189bd5ed5f37456cb4cde7042c83b64aac874ac7295f45e7453933d304d48214
-
SHA512
4eac9bee47d1a51146996f219e3c47a2c1346328c631ab83d8f502aac2bd47bdfbca3e7947487f162ffab40ed4fe51e55ccfa08dac9efd4728f8a40fa24bbada
-
SSDEEP
12288:IV09cAbzIyfFKNq1IJ53neuWPpAP7vRkTnEGGGv2S/:IOD3IyfFK153n6iTvAnEbO2q
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 19 pastebin.com 20 pastebin.com 21 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2876 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2876 AUDIODG.EXE Token: 33 2876 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2876 AUDIODG.EXE Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2464 2232 chrome.exe 35 PID 2232 wrote to memory of 2464 2232 chrome.exe 35 PID 2232 wrote to memory of 2464 2232 chrome.exe 35 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 1600 2232 chrome.exe 37 PID 2232 wrote to memory of 2556 2232 chrome.exe 38 PID 2232 wrote to memory of 2556 2232 chrome.exe 38 PID 2232 wrote to memory of 2556 2232 chrome.exe 38 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39 PID 2232 wrote to memory of 2052 2232 chrome.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\external.exe"C:\Users\Admin\AppData\Local\Temp\external.exe"1⤵PID:3068
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2856
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7059758,0x7fef7059768,0x7fef70597782⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:22⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2080 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2108 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:22⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1416 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 --field-trial-handle=972,i,15099090072517128269,10723265356633217384,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5d0e58c8a4d295945ab5668bb8fcba37b
SHA11bc501180ad338a2c1ad729933462db55ed20387
SHA256d6c0e3785c82df1e5276837f275afc1d8ccd5fc03d9ca39b657a4ad466f55767
SHA512fa675ee4c558e5e29d141d550c6a2094028a31e9069be9f88f0f3e7c0338ed1f5df4a9e59c1f2ae539f13c98d34b87e5f101bd2040552d914b80f4beb7d90d41
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
986B
MD59c87c850eb0c114031f27eb449aa6abe
SHA123379c604a5be19453953a89c5238f6fac303a6e
SHA256eeda10caa7f27753c8497e396698ce0cb9e638211239b03ce1f83111766883af
SHA51282dff715fe7ee5d1fd6647b34016da884377906f471137c4a279efcc320badac85f495badb3a390a884e12d390ab12a32687f8e0b919f442228b486fbfd37abf
-
Filesize
1KB
MD5a0918e5209c4254e640ecbb179376d7d
SHA1f0396b462d9258503e249e68767ff00c72121b44
SHA25667a01a0eff00212028a65187e49e7caf05252a95c273ab67be3cf68da0dd4e8d
SHA512d6c9cc1ebb2eb9131075c5afb61b1a1ca252acbde5990a32425d91507ab129097948cad8750b25349bd736216cd75799e339b5abbb1170183c39a2fb5fecf147
-
Filesize
363B
MD5f2f7dddb00eac6083e343e2e30727268
SHA11cdc2d49eaa3fff8876cd1b49b19a55d24482617
SHA256cece0fe27d2ef16b3a760cd1f8129da742242b970f75782f6fd36fbe67de4345
SHA512fc21a9aaa2dcb476feb9d4142c414ecce0475b0d1fd6416d0806626129714202fc3767d300cddb3761895540c5d7df9d5490cc978e5131e3f046e7ffa4e90377
-
Filesize
5KB
MD581d30340e055585f0c86616785305517
SHA136207ca8bd1fe591a6ccdf767473e6f69b286ed1
SHA256f4022a7bd0b3e00f2057d1a1f29ed8dbbe4505509e29cdf8bfdf2a3ea417cff5
SHA5124819d7e988388450751b8b33275440d92594bec7f939f5711a7dd8b57ce10736121db396fada07a2a0cd745fa06897a334fdb800244f1063fa4c2893c75db5a9
-
Filesize
5KB
MD527396564be0e2079699e7ed1407a8bcb
SHA1919217a7be4ad3acc36a38d7e800d83f3bb57739
SHA256ed0565626aba7a1e6b8385007def1c5ddc571d0ca0959f2a2999386feed21aa2
SHA512c5d3afacc7b4f8726094de6dad76a39ef55d87e5da5d486a3fac95de065d52651fb3f4209200221446d1bc00004dbf53efc1ca568e18ca843d7d35b0aa4a17a1
-
Filesize
5KB
MD5c3e44ad49df0ca2582edc8747459f278
SHA1b07d2b9381b832383a8b6dbfcf47d4f7e7192dae
SHA256b499ae1a3220f61642be08bab7b49196a1febda91a52454b23fe6bc733e99b2d
SHA5127cc301943db25c28100d66ce9ceaa00835082ed6ad642287438797bf9715fcf2b38808f8a3f57a3938f15f1f8e42718bcbc8019d21e71cfef2af2e1ae3fd05a4
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
319KB
MD5ff4f235aeef9b6540c6d0ffae9b880c3
SHA175e912a8c36143a76aea1602754f7a2d7631713a
SHA25676e6ca33bb9c7d4b2139fdaa1d966632ecdcbabc62587741bf4d6e29db0c2f40
SHA512b2071104f838935e13d5ae6b465f82be6c62999176dac034f9af769a91c03a5ed6d925b827a3862b079d9e169bef391b0067ba6171a86c930cb51a7393a576ec
-
Filesize
336KB
MD568b8e88d1b83ac5a735b80f731b0d1e0
SHA1767bac2d9fd29d20e30e7e4aabb863bf9a667a53
SHA256cb57d53c76f62725ceb45f143967723ff25b60872df7298e60e76b5267e44874
SHA512c6fe63f38f7aada8a700a09c5c4f4e5685b94d2389435d0926ff4de54a995c3ffc4a19c8028e32bad155226964bc2a5db6b6fb3b2dac3edd2bfaeee300d6f8b1