Analysis
-
max time kernel
88s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe
Resource
win10v2004-20240910-en
General
-
Target
803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe
-
Size
896KB
-
MD5
536a43d3de5f4acf818bb41029651839
-
SHA1
1ded3dacb997d6977f47c7a8358b302658007a09
-
SHA256
803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb
-
SHA512
f4ef677f5bc042ec4410cc8a3ebf48f9e6e63b68fc94bd53028e5bc5b84a7949466ea48d9fdd58906f811e13d77eb2b6a2a8ef25767998e26a8e59611fe0f7c6
-
SSDEEP
12288:YqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgagTn:YqDEvCTbMWu7rQYlBQcBiT6rprG8a4n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2760 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 31 PID 3052 wrote to memory of 2760 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 31 PID 3052 wrote to memory of 2760 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 31 PID 3052 wrote to memory of 2760 3052 803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe 31 PID 2760 wrote to memory of 2772 2760 chrome.exe 32 PID 2760 wrote to memory of 2772 2760 chrome.exe 32 PID 2760 wrote to memory of 2772 2760 chrome.exe 32 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2716 2760 chrome.exe 34 PID 2760 wrote to memory of 2980 2760 chrome.exe 35 PID 2760 wrote to memory of 2980 2760 chrome.exe 35 PID 2760 wrote to memory of 2980 2760 chrome.exe 35 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36 PID 2760 wrote to memory of 2984 2760 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe"C:\Users\Admin\AppData\Local\Temp\803c36cb6711cb22db01a4a3cb2ff7685ba82841e688d6aa703d0fc72e763cbb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c29758,0x7fef6c29768,0x7fef6c297783⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:23⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:13⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:13⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1240 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:23⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3160 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:13⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3516 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 --field-trial-handle=1204,i,13497063558074405490,6888255393224613091,131072 --disable-features=CrashRecovery /prefetch:83⤵PID:2728
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343KB
MD5eb2f78e77400badc2901eaa9d8007f65
SHA18212f3c071b8afb9351a91c17c61734d714e17c2
SHA2560e2957a7575f40e1e15f015ad43c426c1b8ead1d1ac00e025517d0896649fc1f
SHA51222db857a32b4e7ac1f4f8057fa76e04d1357087433c6e35fdd247d8912ab83cde3b76af1742d066fd1ed96b3e4afaf43f4fcdcaa8bdd69034fac6a4c32731523
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\11ac0786-df12-47e6-9e49-9aa00f7ec7bd.tmp
Filesize6KB
MD593309676e25e898c0a686c03a63280e7
SHA16828bcc506ca84c97c9fa5b010b7438cc1216e66
SHA256ec308854746457b9ee574ee725bb38a1a4bdb7d386b8af39dba7144ee8d23a86
SHA512005912c3d5ccdfea98734c9a1fd5ad59ba98cafa031dd87cdcdebe8fc61bb0d703fe167124cda4267599b7d974ad175756c42d26b3129b71074a1a04cf08e65d
-
Filesize
2KB
MD5c15eee64c83dd45721f6a87cf75b47d1
SHA1611a2553d7315ccc00117d92c7a4655401a12670
SHA2560994164b31c07b3240905aa52132ab6f7d78f2f1b6dc5b6d40aaefb4ad9e6a46
SHA512c5af38b67b478b3bbc16290dd7da2e8301237a0163df7528ffba07e93df13ac6eb6c7f244c2f57c2797b7c3e4d85459fc1d5d30dc724ded6bc1b3ec5e4cffd69
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
335KB
MD505ee5ef5aa4583aceead037f11693851
SHA1cb943857842f1e14740fd1e8be24dcb39a5dabba
SHA25627c37b83fd4528f8785401a531f985993b33c4124b3cc409b82fa66269c8d018
SHA5125e005345ba794fcac01751547dfb51af6312207f6225560ec9c8b57943c62e3d54decf42b8d1d9f82325fab3106dd254a8e30998597a84bc5ccffb72bdba4105
-
Filesize
374KB
MD5042f7f74ead411a46ec8c4e5032bb501
SHA156a4eb2236eaabad5b00b0ca1f4f9b72efcab203
SHA2563933f57d637f4a8a27710a1c01d316a31488e861f96f84ad67eea23bb7533a4a
SHA51231536fbae4e77ac2232e21e9ba13f4392dc139180d1685f10826d05e86984322f229a614d1b9036cf7956477737974393d481b2fbb92332363cae2bcbe7a64db
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58