Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe
Resource
win10v2004-20240802-en
General
-
Target
6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe
-
Size
896KB
-
MD5
f4955459bbd55e17efcb3e9825ee855f
-
SHA1
c3ce62aa3fed48196aa6ce6e8e9d6e29235c4ddb
-
SHA256
6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1
-
SHA512
6efda3f58a9c25078eaa22f67ab85f0adaf6159eb6188d8cfa062bfc56222ff2c3001c9bfc4e0e136ee4f0dbe90c1d0e003a3a62bbcb60cc6420cb3b061b6733
-
SSDEEP
12288:xqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgagTk:xqDEvCTbMWu7rQYlBQcBiT6rprG8a4k
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2096 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 31 PID 2300 wrote to memory of 2096 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 31 PID 2300 wrote to memory of 2096 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 31 PID 2300 wrote to memory of 2096 2300 6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe 31 PID 2096 wrote to memory of 2492 2096 chrome.exe 32 PID 2096 wrote to memory of 2492 2096 chrome.exe 32 PID 2096 wrote to memory of 2492 2096 chrome.exe 32 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2840 2096 chrome.exe 34 PID 2096 wrote to memory of 2708 2096 chrome.exe 35 PID 2096 wrote to memory of 2708 2096 chrome.exe 35 PID 2096 wrote to memory of 2708 2096 chrome.exe 35 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36 PID 2096 wrote to memory of 2592 2096 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe"C:\Users\Admin\AppData\Local\Temp\6d68f328f1ddb26f1282a346b18a9b3a7cf0e8c9c79c8e44bef721747f2328c1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7319758,0x7fef7319768,0x7fef73197783⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:23⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:13⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:13⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1344 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:23⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:13⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3508 --field-trial-handle=1280,i,6195181272571683662,206212699133447240,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2200
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\81a251b2-67a9-4ca4-a676-7db025653ecf.tmp
Filesize6KB
MD513efbbece929f84f39adb5d072640a31
SHA14a37913c9e9197419b67f82660ce6abc840fc9fd
SHA256497b731696ea40246ed896359b7252d6cce1439ceb92b7538eb5a812405de722
SHA512780ad654766bb4788d4b044867131020590ebd56a0cfa2e527b5624a949162f2271033338e98230a9aebb57ec26d4028d0b8575b32243ec6f1609db1ed42a16c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State~RFf78d70e.TMP
Filesize2KB
MD5196c3f229fb2395ec45cc554af45f6fa
SHA1977bfb591a099cadd3f521946ae563d86aa94a62
SHA25612eca0a936a4ff557181d10d695898fbcf52f88704f904900acd20c49eec4dd8
SHA5125f95201377144d163fd5e9c29f4f1ce8f3204673c93e7daf475a30ce64050d9ddf5f40516e111ee7ad4947a2e82582e24cd9585213d74d5552061256f5fbd547
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2