Analysis

  • max time kernel
    50s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 20:33

General

  • Target

    LastActivityView.exe

  • Size

    130KB

  • MD5

    f27a284ef9b018cdd2a98a7b78ccdcb3

  • SHA1

    67e260b11e6227c18cae8925b4f6899103c607f2

  • SHA256

    af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb

  • SHA512

    9a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b

  • SSDEEP

    3072:5e69eWHZXp1nPDhhloZqX6EsSiEF4Gw1aqL1p7BZ5CJ/:5e/+1nrhPKqX6EsS94H8B

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LastActivityView.exe
    "C:\Users\Admin\AppData\Local\Temp\LastActivityView.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2904
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66f9758,0x7fef66f9768,0x7fef66f9778
      2⤵
        PID:2192
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:2
        2⤵
          PID:2876
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
          2⤵
            PID:2624
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
            2⤵
              PID:1568
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
              2⤵
                PID:2860
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
                2⤵
                  PID:680
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:2
                  2⤵
                    PID:2172
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1332 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
                    2⤵
                      PID:444
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3764 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
                      2⤵
                        PID:1736
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3684 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
                        2⤵
                          PID:1776
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3800 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
                          2⤵
                            PID:1740
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3900 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
                            2⤵
                              PID:2536
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4088 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
                              2⤵
                                PID:2156
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2796 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
                                2⤵
                                  PID:2684
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4204 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:1
                                  2⤵
                                    PID:2988
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2752 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
                                    2⤵
                                      PID:1912
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1060 --field-trial-handle=1216,i,3975036394973320369,14583043577910267666,131072 /prefetch:8
                                      2⤵
                                        PID:1976
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:276
                                      • C:\Windows\explorer.exe
                                        "C:\Windows\explorer.exe"
                                        1⤵
                                          PID:316
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x1f0
                                          1⤵
                                            PID:2392
                                          • C:\Windows\system32\cmd.exe
                                            cmd /c ""C:\Users\Admin\Desktop\StepStart.bat" "
                                            1⤵
                                              PID:924

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\8e9c01a8-65b9-4f00-b885-18c995d89fef.tmp

                                              Filesize

                                              341KB

                                              MD5

                                              7f34c3fa251f1f429e2883a9037d7073

                                              SHA1

                                              bc080b339879d1f38f08b6432afef6a1217624dc

                                              SHA256

                                              0a2d7453791ea387741f4b77e693562302a05d1bac179a7c2267c5cc5e7a0fd7

                                              SHA512

                                              023da97280e945daf91f28bea2fcf907a7c5fae6d23b11d4ddf1ce5aa0a3ead857547699aa3e2ecf58eaa7ce24c6030e4773a900fcffd72b5bdc38811256a268

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                              Filesize

                                              212KB

                                              MD5

                                              08ec57068db9971e917b9046f90d0e49

                                              SHA1

                                              28b80d73a861f88735d89e301fa98f2ae502e94b

                                              SHA256

                                              7a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1

                                              SHA512

                                              b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              288B

                                              MD5

                                              db7683d4c515e5d006ba3774a522eaec

                                              SHA1

                                              c393162b3a41095cadb7668063867cdababdf293

                                              SHA256

                                              045ddf4ece0ce74512c01c2f4b4bca41855d9c821b282472544278381008b7eb

                                              SHA512

                                              a3acb4338e9efcb60ab59a8b81eb37823fa984b2e10f06de087063f41946d53a1179fe2fa5fc3bc48d21097d6e9260f20aec11df8bbc4a4cf0d8912e70c19c31

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000007.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              18e723571b00fb1694a3bad6c78e4054

                                              SHA1

                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                              SHA256

                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                              SHA512

                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              aefd77f47fb84fae5ea194496b44c67a

                                              SHA1

                                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                              SHA256

                                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                              SHA512

                                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              f50f89a0a91564d0b8a211f8921aa7de

                                              SHA1

                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                              SHA256

                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                              SHA512

                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              aad19a9e3acf24886ced907a799554c6

                                              SHA1

                                              331896b179f59e0e45eae3c71b64c6d7a0705792

                                              SHA256

                                              2f5ee7e5f0be439dc0bd9c3ce38afdbc7accd1a728974d1ec40c439d5be7a2f7

                                              SHA512

                                              52352582a1450a955ca59a6abc31fca2cee80149e4d89faa6565667471fce4134392e9560bc007321000d50c56e520b3c755147df9240839665c15d9c34df07d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              361B

                                              MD5

                                              932e9ff3273250a4967652a939f62d3f

                                              SHA1

                                              d584302aaaf6aaea8e33d42f2ba52baee1400900

                                              SHA256

                                              dc276dbb3da6105034c9e372d2c03dc9f767cf1a8e57f9e518d7c7149eaf0dfc

                                              SHA512

                                              2f13a7102e93efc78e0952407dddb52fa0988b9c9840f1d4077e1f929765a68bec0fc0ea0ce2a1da10bd42ac72b68b2566fe30727a289cb399cb65dac7daf7e9

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              34b34fc55fa26bfd28fffcfa5d89befa

                                              SHA1

                                              25a86fccdfeb1df19b46e534b3b5148a0f1a9568

                                              SHA256

                                              1c7d8493d1f9537582f2f42758b05acdf1e5cbdd98e95ab15ed2ef6b92b28ba5

                                              SHA512

                                              63c1a211ef7af924374e5625f425f866b25111b1cac4af0e9e86fea3bcf8d77c6306450fae92edbc88b0c0aa92de2f4f7345e7c22c3e6a74c71c4830d45ae872

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              1ac6a0ee2a1c10c29753a62530583440

                                              SHA1

                                              19abbf3b027d8d2b57c13beb6149fbe18a966614

                                              SHA256

                                              ce732349c991f07e329a85aa0e870333cc923b3d123911fbcb0fa0f775da1f39

                                              SHA512

                                              15210d4995e13c5e5985594f0bfafe13053107f74298d83c1e778fe5975fd9ac316d1fb32ec101be91b03fb00830d1ab65d096b2c7ac2767c4fb364bb317a6d9

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              91155ddaf5aeef6aa8036c4d4dfdca60

                                              SHA1

                                              bef56ae9ad7264bb83e587d7799365ec8d7088e4

                                              SHA256

                                              0bb4fe36d9e54f681f995c74e7c84d7285ea5f7e18842554598b1590b1364be9

                                              SHA512

                                              1c59feb31ab5cdec1c9b9d0e3f5ad76c9c6d648c11ce20414b938e0ce8d7e5639b027332ec5c14fae65652abe6af79d65dcd2f90b9b31f551e0acc0648409947

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              668efd8ffba9f8693b61be3b32eb2b9f

                                              SHA1

                                              04bb91d444dca6a5523a4d1168ec3477dab8bbdd

                                              SHA256

                                              75e8ac3ff033ab4f4ded66da0ecf6814f084c8af241720d5ab32ec0aa8ca40c7

                                              SHA512

                                              6d84821de34ec7d5839cb5e3113d83b394c0150ecbc80f2e20c37d6ce11fbdd4c715aa0ce8e107a806a72c6850436a3d32bf4a04244722bd7241cddc29ce1195

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              341KB

                                              MD5

                                              f31cbc73bcbed5f50bae349eb89092c7

                                              SHA1

                                              d5301d7297c080ac5e764a79f0b81909f04e2f44

                                              SHA256

                                              beb32117f8377415b443daa3e831eff9565bdcf24eb71d148776e3d2bea197a0

                                              SHA512

                                              fee8a1c0eb102bc4b788cfab0bf71b3d134197503bc49f9c463d7ab4efc9ef843b8d041a4d421b4d8879b4fe4d38c29f7dbda9ed23cddf4d896e392ec1f2cf1f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              341KB

                                              MD5

                                              21f4b0a313b1f04672ac07ecfea360b0

                                              SHA1

                                              4233569de2bc4ab4cd6846794548f31bb7322a64

                                              SHA256

                                              3fba0463197b12e512a6e35b2ba27e21e609774fa148025a0ef2d3e487d65103

                                              SHA512

                                              8fb80fff0d892bc1eb6d20e35db710912bc98cdad948bc094bb5d92a7a5f6ff66a2ac95c624c440659038730d2606b28fc3f5cd6ab0455133d0c214154a4582f

                                            • C:\Users\Admin\AppData\Local\Temp\LastActivityView.cfg

                                              Filesize

                                              598B

                                              MD5

                                              4118009d7bb092c729c936f8714e3d79

                                              SHA1

                                              cbfeb3cb519839a82329d8b7445bc53111207b40

                                              SHA256

                                              00357ed308104b34ef86e5b40314b74cbdd39aa46c8174c6743a81184693931d

                                              SHA512

                                              c933422becd171230ffa6ad7ca48b4f37d6bee02aefad5f9da7c9e55d279ded2a38206483dc74062076bc7c69f3996a220627a820048527a6c5df823144c559c

                                            • C:\Users\Admin\Downloads\Unconfirmed 59306.crdownload

                                              Filesize

                                              1.9MB

                                              MD5

                                              f26a8670a05fe5c96c46e3d97771be6b

                                              SHA1

                                              9db66eb7a15a9f291a0e2cb7ff1f137da0315414

                                              SHA256

                                              b9a0ac33553026024bffe48b376f50213cda78b0c94673495f5d76afce8dfcda

                                              SHA512

                                              cb9976ac716a6dab3d8087d745d66cf20e30ba4d5170c4d9803e093c5adfae1c0d1aa6a178e2b0327df4ef61729a84aff75ad1819ff45cb4dc17206e4f93999d