Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-11-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Chrome.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win11-20241007-en
General
-
Target
Chrome.exe
-
Size
822KB
-
MD5
dfe9a9f1b8384990ac9b8f44c9305a9b
-
SHA1
2e1d01fe1920197aa484b98deba38d32c9cdcac0
-
SHA256
9bd6b2b7a07de015273594db5e1702fc25f7ef32c7e53db44845d0a6f3296ac5
-
SHA512
3d46375ae06808ba1ad3fd1c4796ca2da753f99fb02dca879b1c56c9e07cd950a684c6629551fa9d6cfbc86b619f6de2a4d97b5547397addf41f3ff8f7228e11
-
SSDEEP
12288:1X81XL3K8KysjJS+yeHMm9jA1Qcp8ujw6kVNZDXxVs4iP9ZoFD5Li46G:E+GesuiUNNkIFgpG
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3528 set thread context of 4852 3528 Chrome.exe 79 -
Program crash 1 IoCs
pid pid_target Process procid_target 844 4852 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3528 Chrome.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79 PID 3528 wrote to memory of 4852 3528 Chrome.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Chrome.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Chrome.exeC:\Users\Admin\AppData\Local\Temp\Chrome.exe2⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 923⤵
- Program crash
PID:844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4852 -ip 48521⤵PID:1184