Resubmissions
23/08/2024, 19:36
240823-ya7gsasdna 823/08/2024, 19:35
240823-yaqh9ssdmg 423/08/2024, 19:32
240823-x87d1asdjc 3Analysis
-
max time kernel
39s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
server-seeker-4.4.0.jar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
server-seeker-4.4.0.jar
Resource
win10v2004-20240802-en
General
-
Target
server-seeker-4.4.0.jar
-
Size
307KB
-
MD5
624e83f0ab302b14e5a3966d095b10c9
-
SHA1
e411563907a957ce1fa33d70c6c8476e8675e428
-
SHA256
81e0b041a17184930bd871a11a1087bfe233044cf1f4f2c5bff6cdc54d396f10
-
SHA512
fa8286659e233f7a85d911251c038d87cf2a0e9b8fb92634847391af117c1de5d1cf25c103684335f2f2c1b94f41f1142b2f7cb1af884f2119bbf7816b679348
-
SSDEEP
6144:H8VJ8HoMZ/IGDZkTXknA87u7VeIvRLuNEgddwhmoaO1gPixDJTzQin:c8IMpI8ZkbkA87upfvRWJoaO1Aix+in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe Token: SeShutdownPrivilege 2620 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe 2620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2656 2620 chrome.exe 32 PID 2620 wrote to memory of 2656 2620 chrome.exe 32 PID 2620 wrote to memory of 2656 2620 chrome.exe 32 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 2712 2620 chrome.exe 34 PID 2620 wrote to memory of 1824 2620 chrome.exe 35 PID 2620 wrote to memory of 1824 2620 chrome.exe 35 PID 2620 wrote to memory of 1824 2620 chrome.exe 35 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36 PID 2620 wrote to memory of 2124 2620 chrome.exe 36
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\server-seeker-4.4.0.jar1⤵PID:2756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef69a9758,0x7fef69a9768,0x7fef69a97782⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:22⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1544 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1164 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:22⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1400 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3724 --field-trial-handle=1380,i,10321608263390697446,8344324962139105004,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
Filesize
280B
MD563db9af4b43eaa268c7f4bfac6238aa0
SHA155b076c42d781dbad54dcdbe54998116c53465db
SHA256aaa959028165432b988bad6b7a38faa3af37d6b74dd423a5f8ab77ad55a3f187
SHA51218060049da995ca9a9813aba7644d07cdae5e3c0d733f24549044db7f22c0187b097cbd9c5ca4c6510f1e7d9793a705d639551b8489432c2699f205fc855eff5
-
Filesize
168B
MD5bb0a84e5e0068b1ec4bf1ad6135a6235
SHA160e11dd38ddc08728f17a1c1d66834ba26bcb00e
SHA2565c454f60b518359fe8d5a4fcfcb2d27c36e27f4fd2112133be0ddf24575e2073
SHA5129bf60c3dece6c1e6db11cdb0291e21aa45078236046f410105bbc07bd4d1c81ecd55b5e76f109694c7dbdd4e86cf63345195d58c3e8550374bdb09084bf37ba2
-
Filesize
168B
MD590eedb5584d94d8f2b36f1fd5fadcd34
SHA12d04e4e38f92a8b3a7a652558b38c5d00e3876eb
SHA2569eccc083db1d71c176637f90d8519a1512c07830cae7694dca6d11e0791b0d94
SHA5123c409a0f74d49f9b14a0f2d23b39a4dd06af26756a5a8f47aa5c58df93e94f57272a993463941dd9c5497408a3b4b964a6400dc75f71c9594f76475f0edac866
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD5c0ffb1874c19bacf9be1ea88a0eec67c
SHA1bcfe08630740876a9b289758e49175af4a9672bc
SHA256549791a0934c27607578fa05c30666f3a5fe06fc691d4a9e181dee749610b171
SHA512ae447a2fa782d704126e2ffc393b8bd9da0a5105db09843564b1a9e06ae3ce5c5e87b47bc55d422ad670c96547248279db85b0a30bfd656531a1aea58461c4c3
-
Filesize
6KB
MD5bf697fba4bb662ff449a72ae20a01fd0
SHA1ec8906ef72a2a9b3947a65ddf4a414b6a5ba1df3
SHA2561c5eaf4804bec7cf6d31287562a158c66b15f8f8efe621d20ebbececd402be38
SHA512b012cbe89fc1fbbdebe98deb6869bf9e7f356c02d631dd933854a72cb5d3e246d6b8b4d957aa224d78f0afe3585298e0ed463a6c427eebfdd8e8f1b65d1ad19a
-
Filesize
5KB
MD5701d0336ca4345f4fcf7e77d6c668bd1
SHA18262225a47d83f5c06576defb20e3816081cdfb7
SHA256548c834daa0dc46b3d3522aae7b7a620e943f76f06fcfc9c6546516aeac96cbc
SHA512685dd396c63d42675c93e106ff15a83c1bb3f862f90ec18e9a9e4dd2e940e016c6a1269d24e937a2203f5438362e6fc7dfdffcf12d1a421f121ba8d714ece9a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2