Analysis
-
max time kernel
63s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
897KB
-
MD5
04ca275b1270833d4fa6198f72714209
-
SHA1
b7a7398967b246a3a6d14060a3e1c554108a8de0
-
SHA256
bf0cf6cb2d3028673bfdc02d6969cb0b0561a36899dc9fc8d50596c3b3ca9a7e
-
SHA512
ffc8fa7689918ec44ebd1cd619e8909795cf7f353aed92bbdd60b65a2573941832ff7c59e76d2f1873e8ae8cf00ca68e02df703a200410f8f1145dd22e8e2da9
-
SSDEEP
24576:pqDEvCTbMWu7rQYlBQcBiT6rprG8a4+K:pTvC/MTQYxsWR7a4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2764 taskkill.exe 1752 taskkill.exe 2952 taskkill.exe 2660 taskkill.exe 2380 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2132 file.exe 1804 chrome.exe 1804 chrome.exe 2132 file.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2132 file.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2380 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 2660 taskkill.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe 2132 file.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2380 2132 file.exe 30 PID 2132 wrote to memory of 2380 2132 file.exe 30 PID 2132 wrote to memory of 2380 2132 file.exe 30 PID 2132 wrote to memory of 2380 2132 file.exe 30 PID 2132 wrote to memory of 2764 2132 file.exe 33 PID 2132 wrote to memory of 2764 2132 file.exe 33 PID 2132 wrote to memory of 2764 2132 file.exe 33 PID 2132 wrote to memory of 2764 2132 file.exe 33 PID 2132 wrote to memory of 1752 2132 file.exe 35 PID 2132 wrote to memory of 1752 2132 file.exe 35 PID 2132 wrote to memory of 1752 2132 file.exe 35 PID 2132 wrote to memory of 1752 2132 file.exe 35 PID 2132 wrote to memory of 2952 2132 file.exe 37 PID 2132 wrote to memory of 2952 2132 file.exe 37 PID 2132 wrote to memory of 2952 2132 file.exe 37 PID 2132 wrote to memory of 2952 2132 file.exe 37 PID 2132 wrote to memory of 2660 2132 file.exe 39 PID 2132 wrote to memory of 2660 2132 file.exe 39 PID 2132 wrote to memory of 2660 2132 file.exe 39 PID 2132 wrote to memory of 2660 2132 file.exe 39 PID 2132 wrote to memory of 1804 2132 file.exe 41 PID 2132 wrote to memory of 1804 2132 file.exe 41 PID 2132 wrote to memory of 1804 2132 file.exe 41 PID 2132 wrote to memory of 1804 2132 file.exe 41 PID 1804 wrote to memory of 2080 1804 chrome.exe 42 PID 1804 wrote to memory of 2080 1804 chrome.exe 42 PID 1804 wrote to memory of 2080 1804 chrome.exe 42 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43 PID 1804 wrote to memory of 3052 1804 chrome.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb1e9758,0x7fefb1e9768,0x7fefb1e97783⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:23⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1552 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:83⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:83⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2128 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:13⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:13⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1156 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:23⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3244 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:13⤵PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3568 --field-trial-handle=1196,i,10794695841750135037,10288188030674537512,131072 /prefetch:83⤵PID:1820
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\12549f3c-74be-40ab-8856-303859beac35.tmp
Filesize5KB
MD5ee41be88935967f39cddd760ee4fe2a8
SHA19e2a5f84817d46293fcce9fdffaa5e0ddf716601
SHA256552ece3b82326d35f84b0e51ff8a4e041f3c2715718abd689f3516ddd59300ff
SHA5120c4070f5ebb5184821438bf1dd52e1df01ffa239c739a5bee6190f272b1dd223e5f5bc49ca5edd8446aad722e0062d5efba452a82e7cc64debacbd20f3fdfb6a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5c7c854796e8d619c9a827f37dfff64eb
SHA174cfcaa0cac4a11ba3a4fd88248fa76dcd35b41a
SHA256be4cb46bca2cc65debff77d01aa89d04c45d838a1037d5e1b8844a6e8915b16d
SHA5123233ba1cf04d5f9156632c46ba37cf74bc3c331221cfdce3ca2c9f95bf50a6fd10ce2bcd8b1fabfa5c903aae6f267fa374c81f7c515466bd4f3343eb1f4e1578
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2