Analysis
-
max time kernel
462s -
max time network
453s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
Fax#9628757Ril_19 September, 2024023909 AM_970943141785846.htm
Resource
win10v2004-20240802-en
General
-
Target
Fax#9628757Ril_19 September, 2024023909 AM_970943141785846.htm
-
Size
7KB
-
MD5
602e0585e2452e06bce1e0f8f7c1ed7e
-
SHA1
1029bd69a2e043600f05795b885d55f3c9757d64
-
SHA256
32b622aed8222dcba16cc876a07385a64f518ef1137563d9dac472c17f4d33e4
-
SHA512
2cd49060200ece9be49921a984396ba90f150d3300357cac7436568b8df5d61868d6eb879f2a38b9ab0a3a51a848dfe22d6e7f9d57e0c9fda933ff80e8bd9dda
-
SSDEEP
192:Ko4aiKe+jwSNERDouKbsvELvtW2LJOER9OsIV:KxaiKDDE9R8svELv02LEERjo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133712025260656024" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 1284 3912 chrome.exe 81 PID 3912 wrote to memory of 1284 3912 chrome.exe 81 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 5096 3912 chrome.exe 82 PID 3912 wrote to memory of 3580 3912 chrome.exe 83 PID 3912 wrote to memory of 3580 3912 chrome.exe 83 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84 PID 3912 wrote to memory of 4720 3912 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Fax#9628757Ril_19 September, 2024023909 AM_970943141785846.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9da78cc40,0x7ff9da78cc4c,0x7ff9da78cc582⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1740 /prefetch:32⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4336,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4884,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5052,i,9100777427586655922,15349112005581260048,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5caa0836cb962eee79058fbb67dd4e963
SHA16c0428a6f2c5a8d6934e847a5226462d71b97a19
SHA256639c4b0d8a392b318712ed8dd33670840058a49d9b0149608c3106464d6596d4
SHA5127cf772a6d22fe66c063edfed7db7d2fdda4cd7258030121e4647652ecd18a412b2a6152d6eeb36dd06447be4c34ac909ffe1bb9d28cce839e3054d8ffd4c2fd6
-
Filesize
1KB
MD5be941f691bd61f1213ed5108efff236f
SHA19f7a258d27b2c443f34e56a42187c73e604835ed
SHA2567e64a55b94ec45a4e45c831818144150976c06bc0a60c47f299eba4565cd0a74
SHA5123bd9ce354fc35442b996d164319ffd2ee2a9dd731273961842754ad29a43fd2593960b2a1d9dc94c3c2739ae933943bb9f175d14faff25f73faf55b43d9d535c
-
Filesize
1KB
MD55691b64204ce6651b03ad539a6742cc5
SHA1bc91224dc5147f958ad695328fdcc9a646fff702
SHA25689afcd2127fb201cb7f698b351ce7283b162844b0446fb1a822e76efdb2da131
SHA5127f40da4b634cd478e090a2b8bf75e36b563f6d1637c1c5921ccd352af6471864dbf94b5ca2420ab0a2c132986177e3403a83cbf9c1d80122ef6ffbe1dd7eb6d5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5c407e0c3e0df7f98c58a3c5d6a402833
SHA15f925ce0b0679f6a376254a1d2d755e4eff8a91f
SHA256cb22e5f5d8fa54264b9bbb4f6cd4387c4c8a0e905f5a91c9c33a8db31d30fc24
SHA512d613f40da7069b4a8f350974f17e9d64af02754f39505b30afbc1e1adba9d60e081262785b47ca6ed3e063d016ac872b1699ad925040786f5f5395e9ce344368
-
Filesize
9KB
MD5dcc3984034dafbdf7327ff11bb315117
SHA1aa72439a2163a07926bd229f89a7654c4e5989e5
SHA2561b64b9058419f9ac0e304eb333e5a2d1a87378045635d0d504416b2f600ee098
SHA5122b0ed6b2f045d0c8c60bcba00d0262438f3c74d6f312846418f2ff6d380ebce137805fa23daf3f5a90b6056e1da738ee68a43045e428c59589403a4eafaf315d
-
Filesize
12KB
MD5df187e2196334b965977374571d98a3f
SHA1392b47a1f308fb8c87677ca1a689c7389a1f58c3
SHA256efe6c73bd6fc8146cf1647c400753cd7522bf4f1279b4d4dedbf66498da82a8a
SHA512c2c1f510c732c2fea92ad8d29ba1d5baa2004dcd54ea55a885ece9bf1e20a7c6fdf96c40b0401ab6f9474fe64454e293bf3f4468667d294f3891a99ce64bfd35
-
Filesize
11KB
MD50b4f15d9c2ed991721b34d679c128959
SHA190b73d348dcbc7e5654e4886636dd78aa2771c0a
SHA256746bcc34b94d9f2da548c68306b62c0a1b1a75779c65433b443576ff1124bd64
SHA5128ca8cd423315b38b0f97153ba1bbec813915f05c7ed9ae6ce570f971a932d37958247f8569c1a0bd55fa8c77a841c9d2f6515c53158fc201a6d4db05df7a8482
-
Filesize
99KB
MD582ac6fe8347000a1b6332590dba226a9
SHA187982b0a532620b9d38c92aea25c7454ef590b92
SHA25623b2c9d94e83d1b2c490ab013f044fb3dad60676bbd0f95b2078493813c2db33
SHA512cf2e6a8322037eec2f06638344ad4dd13a32e6518479f46c0fea4ec05d11ca3d575d26734f9c00b47334035766ccd14ea2fa1acb052023528f08516ac9240f1a
-
Filesize
99KB
MD5b5a124a10254f0c60ce9ad2537b328eb
SHA13c920c60176c79d66c7e08ca2ddbcd27074c8ad9
SHA256b91077c7a749658e8f5cd6737fbc2e3a4789621824d2aaa1cbdd927ace7c752b
SHA512271fc7bf2bcbf853ed4965eb91c19ac8290cf733c9e646d161c671e0747456000bc98a2c0ff0ff0e7b94112155b6b0a708c957b5c473953e2fc7edc70f711a8a