Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-09-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
START.wsf
Resource
win11-20240802-en
General
-
Target
START.wsf
-
Size
3KB
-
MD5
a58311373246197ce552ceba70ad8b5c
-
SHA1
1e637d4b87a39a2d569a81ef99b18184b4442c1e
-
SHA256
c48cd7ddf41dd81fae4db362c5c631edb582f03fb170b1a858fa655d6ccadce8
-
SHA512
b415cdfe258eb28e6e08b22f400f32699bb9d4df25b51754c9ea92028aba315c73dd6d7280b4743ac1f06f87275c7535248be441dbe7585d5fc9ca536b3abfff
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133701464678922915" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3584 4928 chrome.exe 82 PID 4928 wrote to memory of 3584 4928 chrome.exe 82 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 5440 4928 chrome.exe 83 PID 4928 wrote to memory of 1428 4928 chrome.exe 84 PID 4928 wrote to memory of 1428 4928 chrome.exe 84 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85 PID 4928 wrote to memory of 2656 4928 chrome.exe 85
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\START.wsf"1⤵PID:5320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffa5c5ccc40,0x7ffa5c5ccc4c,0x7ffa5c5ccc582⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2072 /prefetch:32⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2096,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1704 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4384,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4380,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:4348 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff775d44698,0x7ff775d446a4,0x7ff775d446b03⤵
- Drops file in Windows directory
PID:2200
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3668,i,419228333662972907,1419280819177955662,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5728301293d4e49b243a222d0d21e4c07
SHA1daf9a378ab098e98cd9bd2c99383fd7efc962603
SHA256e644154a6b99196ba23c5c99c6cb86fd6e9d38e59ded322d9ee7e02418a50808
SHA5122b21eeba11ec0de30c01e3a9ef3ec22c0f507cf2dac4525a3c343715f3f99ee99883424e6e33878c294da93747e457dbac17686ba0d50e991f995fe53c7df899
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
216B
MD543615e8dff506741b4cc429c2a611801
SHA17a69fdbab2066e4cbc65acc4f20315e686104dda
SHA256751187927cae6ae042e614ea0011ecc958c90e40e6278ecdd7b791b1f30901c2
SHA5120ee0155267191368f52a0c1835af6da974769985718bdb894f9cce3473a9af9dbbf93ba4e2e959d4a0ae38a16f3d6cf7627f1a2fe32907446672380a335cfc7b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD58e86e134df161dec1c4bdfa77d0d9aa8
SHA12345711b092de5a912eadce0053b97632e97f8be
SHA256adec913ce34cfc912b49c932f6cd53a37d55605dd4e39bbad2399b0b291754f3
SHA512ec707a6dff3d69212ff4bc08cb4fbafc106ce06654828d2ea05ee1a68354902fd2e413959eb5f06139347c2bbf2ae02cf5286dd4f89f47049ec182c81f0c3ba2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\b2544543-5575-4521-9fc4-5e64727a2ae1.tmp
Filesize1KB
MD5129194967aa84d643052ec1ae162135e
SHA1e85df021084eab600407a87bcc33eae8585cc1b9
SHA25605c2b801f7f7e7f054e168b936fb785dc90a13e75d34cd3d84a6bfd5f56bf099
SHA51282f2ef618b8f9eb0c84c09ae5bdd19326caf13b504649c6deaa050bf196c8e7cafbac671f74336106f4e8c7cc1fba040dea09b53d674eba8845499774137f3b7
-
Filesize
9KB
MD5eb44d126491354830e43f0d80370a75c
SHA17626b982f26acbf5d9a93cbd873e3df064afa705
SHA256e84d6857a2aead4e92ee4a1fa95ea6b4778cbd0a81e9443dd0eb74ef3af01634
SHA51278d98d699bc33220877bf982cbda19a907e053fee33d2901a44203c894a070d0f8e8e39079d6307a96a948a9ffd5f61187831a8caf1c2c7d13747856af69eff0
-
Filesize
9KB
MD5d04a1ce0c23459256bd3576441388091
SHA1f8b3c5f79cf7be2e550605de5359996612743fb5
SHA2564d88f77cf77c7ceff24358291c6dcdb534edf4c7956c8c8ea130f04a02b80115
SHA512a3b5a5a264725b4cf450623fc5b224ee479dc10626b70b7e7688455394f688eec889d15805f15140b41a9fe0eb2e8828376b096e4ee95089b81e2f7999db649a
-
Filesize
15KB
MD56490341ad161a1f3dff46aa6a0197c2e
SHA1876c7f677e927b4db983670c92fdfaca0a62d3c4
SHA25625980a5b501fefa3c6bed07a33b4f078cd8b4bfcfd87d31296836e1c2ad3fa6e
SHA512b904b99ab522dc392f19622dbc3848190f9f78f4182568cb60685544453b8e275ad54c288f56cf4e70c6723dce99440c689bf60a49c4bc7591c252e72e0fabe2
-
Filesize
205KB
MD5c0ae7d6a519553d5c07bbd92993c5802
SHA17d47e8515f6d7e8095b98d286aec5ffb7154c692
SHA2565a86f05ecff31550cab9a8d6042bb8e21eb0dab57aa35dab7b3fbf16cfa2cd52
SHA51248df7a26006273c578baa8db8a42d4c913d623be2cfc5c41efd8ab2223857e1af5cb59b1cf94ac7b943628178fd6637cc2d8f36c087759235f75e0e970b1a846
-
Filesize
205KB
MD51847ca4aa7a5d20065a40ecc6c1e5256
SHA1b37daa2f4136d019686c76dd908b7cdaf0c74d5f
SHA2562936ef5a5dad0e521e1f4a31a69aafa4543d0d927f5d3862591eba981dba6bcc
SHA512a9d7f4836f28936e92ce0f8a5bb60d32359b790fd70e5faa13c3d2c889956862da7c9818726db7b0227aa463973a5db7bc62a972a3a7b006fc344ad21beb6177
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58