Analysis
-
max time kernel
65s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 21:53
Behavioral task
behavioral1
Sample
fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe
Resource
win7-20240903-en
General
-
Target
fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe
-
Size
491KB
-
MD5
b713197714faacaf16f0a7a3c2dd09fe
-
SHA1
4f19a9666536c695d8d99ab7745c2bf7a543feda
-
SHA256
fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97
-
SHA512
4ba7a836ace16cfd56855896ba0e06a1eb7ded68a2d0c605ef99acf975ab220364f3f3f8847a22085b34d1c0a09adaefdebfafeca49fc72524daf40cd0455ee7
-
SSDEEP
12288:gYbP2dcxBJ81d0WlpNlLrTOshx4UnTOt4olSZVvTFlm4ng:gYD2dkJ8EypNlT7at7MjTrmeg
Malware Config
Signatures
-
Raccoon family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 3 drive.google.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2112 2452 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2112 2452 fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe 30 PID 2452 wrote to memory of 2112 2452 fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe 30 PID 2452 wrote to memory of 2112 2452 fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe 30 PID 2452 wrote to memory of 2112 2452 fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe 30 PID 2700 wrote to memory of 2800 2700 chrome.exe 33 PID 2700 wrote to memory of 2800 2700 chrome.exe 33 PID 2700 wrote to memory of 2800 2700 chrome.exe 33 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2608 2700 chrome.exe 35 PID 2700 wrote to memory of 2648 2700 chrome.exe 36 PID 2700 wrote to memory of 2648 2700 chrome.exe 36 PID 2700 wrote to memory of 2648 2700 chrome.exe 36 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37 PID 2700 wrote to memory of 2332 2700 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe"C:\Users\Admin\AppData\Local\Temp\fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 3242⤵
- Program crash
PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6cd9758,0x7fef6cd9768,0x7fef6cd97782⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:22⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:82⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1692 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:22⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1260 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:82⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1364,i,2858366454529881151,11051763605873301806,131072 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1484
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\19fc5fcc-eb59-446d-a199-9184a1fef5f4.tmp
Filesize5KB
MD59fc08dba202abd267fa7f29f3ae060b9
SHA17931f7943732a24b72f04b7888223117b053eed8
SHA25662cb196d7ffeb470e545a7f3492f0b07e44909ab288198f8c3b532b86fc8445f
SHA5126b19df490a631bb1acbec7360ba3cf092e205e74e9f84e89ffef7f33679d571b80b3b939666c4ebddf8dedaf8f4937a5697f96d26bf3080b4d8c9c54367757c9
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5981e1f2f3a3b253d9defa8822e3e852b
SHA134e40302b8b95de798a18db29eb6bd28e6156aa0
SHA256cac5db7461c62933aba5b6bfc7f5d4e9784f839a8bd2a664e581603a2f77747a
SHA5127866d50ef2d12eac9ad36129e3576a4d8a000ca89fabc07cdfae34412ba24b7573d77e64eef2e3a87b5e835bf704db41a440478f5fc54aceb6df3ea9d1a06ac1
-
Filesize
5KB
MD5aecd7c72ab4a0b6f85c43afef8ab1db3
SHA174bda1a46f899984659dfad2d15d71d77efe97cb
SHA25642394b5ceecce0660efda2360812b450e7f58a3c06fa687cc5edbb22462ac3e6
SHA512270c095ea062d2791ed8a9e1a7dbbe1b58648697f8e7dea8ee68e8446552937e8bbbcc81006ed265e2af395f5013799a06a035eb95e3234c06cb0e9cdd38c3e6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2