Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
V1.5.8-23.02.24
Resource
win10v2004-20240802-en
General
-
Target
V1.5.8-23.02.24
-
Size
176KB
-
MD5
4e606bce243d65c77968d90be6474de0
-
SHA1
1ecdc068976e124dcae98dbcc62b8ad694e53449
-
SHA256
1cdc1fe3cf994045b76c61020fdbdb445e2cc9c635096566815b9458621386f1
-
SHA512
b9fd9271889c8e94ddc6c0d246b4c85be57f6147bd8f645370d32017a993faf049c1912601bb05096e4b766eb1bf6a489b6e29bc752f2cc1257813d11997e600
-
SSDEEP
3072:mExwhTSr9nl1fT2nLNY6/X6OOKeWR+iCT/xzNGXFsZrSr1gee2IGCgVdCv9oZr1B:tVokh3uokeOvHS1d1+CNs8wbiWQu9xv5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133690740379885644" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe 2352 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 2540 3492 chrome.exe 99 PID 3492 wrote to memory of 2540 3492 chrome.exe 99 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 2936 3492 chrome.exe 100 PID 3492 wrote to memory of 4780 3492 chrome.exe 101 PID 3492 wrote to memory of 4780 3492 chrome.exe 101 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102 PID 3492 wrote to memory of 4948 3492 chrome.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\V1.5.8-23.02.241⤵
- Modifies registry class
PID:4140
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffcb0b6cc40,0x7ffcb0b6cc4c,0x7ffcb0b6cc582⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1784,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2656 /prefetch:32⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3716,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,15540336884829534212,17317298678730738381,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53f0765d443d197340710e0b92a96b0f8
SHA1314c82b6ae4dae7fdd5bba2613bf0eb4ad2b23bc
SHA2562348fdf35c7a4229391eedb74b1a5ab3fad9e2364514567165655c18f5c1d833
SHA5128acf1be34f30c726257ff5b98c7e400db4d8ce006d7fbb43769f9d3adc4452c18f52ff8c18a704e6e4f0a5275a1b0a58247eb7d666de287da02b00bf773d1b3a
-
Filesize
1KB
MD55db47a8b64faf1a0a167aaac7ad912ae
SHA151e985010526cf4ea8d4eb7f4d6583612175375f
SHA25666111d2dc0b8ad505487b30b8775b9e76e2912365c1fb9f7635511e03a0a9884
SHA512f150c03e9fa218b290e435566a6acb72aa0769ff4a34bda14447ccc29098f24d715d861c75cf3ce85dc24596184fbaebb81342ed7176704860c70e1aa1de3b0a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5a07f9b5c311da8609de67f74dcfd0f69
SHA1f32bd55ea0cc59b745d89b8df4e26987836f67e4
SHA25664a0e70e7e3325a37b0b51dd1a1476ea4eac9b96561e6def93ed7d16f9da2c26
SHA512b31cc13beee294522719abd2ffa97fc4b78225c881ac78b63b157282e133f46933e1f99451032121e7cc70479cd941b737e9878eac49d718f567db0036585480
-
Filesize
9KB
MD502bf5cf41fa382c4d4ec71d7a2893e5c
SHA1b6bffff2bc24e60ccc4a32d6fbe16a9522f7126a
SHA256eb7b814ba796a3600758f4889ba3eb02b3c659e5ce497aef61121b7471a14b08
SHA51238ea05066ca88ec342db0019c8f14508caf929ca2753f6eb040f4f1906d12162b584b9b8d6d90f46a99dc6676d20947a756af5a5cb274f4a93f1cc08073295ac
-
Filesize
15KB
MD55ed0ee21c5d8b82084a13bffe1c10a13
SHA166be6af6823e32f89546324a855c1a9ebaf99db6
SHA256fbc0fd8b0a6cc7a91f2b22d0d3718caf758e9663d579224022d9ea7189e188cc
SHA5120c6acfe985de13ce63f8a20dd7461d73d7ea667ef5f4e2ed3d42070fb1f92ed549943d5a1c7282427a65030f260f872e13b4d41708fffdba1f68bea747e4f14c
-
Filesize
198KB
MD593ffeea741621e1de40b1d419d2c47ee
SHA17142ea8edcb9e5e98b949ec984d1d36120af4c65
SHA256f62a4e38c403cc56b04f80c3cec06a4e8546bbeb5db20818631a351230100e82
SHA512291f40a2655689a0d281ce3286907abe6f02b93e9e3ecbc59502d188e1fd0fad8a3701614034c60466d95e68ab28e2d36e272affe502908d3ea9a1e5d3da6757
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58