Analysis
-
max time kernel
905s -
max time network
841s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 02:54
Behavioral task
behavioral1
Sample
devb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
devb.exe
Resource
win10v2004-20241007-en
General
-
Target
devb.exe
-
Size
46.8MB
-
MD5
5b48376e6b95e7c35233827383edf3e3
-
SHA1
08f54af998fa63765cdb27b0c5dceed04a4508fc
-
SHA256
ab58b96de5b4bb1e14b50ba7f1fe32185d371ea62e5e9a26743d53cb9c5af16c
-
SHA512
1a8c72b9c4a77f108b3d72c7f3444e2f772b6f5d8646ab970d4d1df46f1d7aa3658028430ab85703b2217176588530e84832167d35b6c2682ec3ef799d7c70cd
-
SSDEEP
786432:bLVl8ZKW8ctAj272dkg/IpG7VB8VPhqEzzcY87W5hxYnTUm4AfawNZmk:b8KW/0uSk8IpG7V+VPhq6E7W5hxVmffT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
devb.exepid process 760 devb.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI24842\python310.dll upx -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2576 chrome.exe 2576 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe Token: SeShutdownPrivilege 2576 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe 2576 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
devb.exechrome.exedescription pid process target process PID 2484 wrote to memory of 760 2484 devb.exe devb.exe PID 2484 wrote to memory of 760 2484 devb.exe devb.exe PID 2484 wrote to memory of 760 2484 devb.exe devb.exe PID 2576 wrote to memory of 2368 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2368 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2368 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2476 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2392 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2392 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2392 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe PID 2576 wrote to memory of 2088 2576 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\devb.exe"C:\Users\Admin\AppData\Local\Temp\devb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\devb.exe"C:\Users\Admin\AppData\Local\Temp\devb.exe"2⤵
- Loads dropped DLL
PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6819758,0x7fef6819768,0x7fef68197782⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:22⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1804 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1148 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:22⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3212 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3316 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3580 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3516 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3772 --field-trial-handle=1376,i,2361936611973665522,16286685079652001011,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
363B
MD5b52d6ec19137d6e14d462b374a722e02
SHA13867c6c77ce4a35a158ba42733d908c57503db9a
SHA256b51db7f2c9b1778103b33c982ed420838ba77c691cb92cd1bc07b5008e6f442f
SHA512069b5c74be22952ce8bd4f36bf8783f80498a524614a94c2203816145dbcb564a4f8225f180db01337154579f0e3a6a7274b54d9511110047ce848a2bd46cc21
-
Filesize
5KB
MD5a38e13caf54c74fe0f842373e3b310c4
SHA131d3007ed95cda76d3e4e653489aec72314d61ff
SHA256ed7dfbcef2b6340948d3218f2969accf092595cac272bebf067241e0202b59ca
SHA51257a5077959a71eb2662df480f28c7dd1a000d23d8fdb175bd79e67c78494867ff204dcb38ac3c9b659dc5342dca624d3cac8d262b00d9e33b3b009a3ad110126
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
345KB
MD52ee8201bed42e17064344c3bcf961efd
SHA18c57271b8a1e9a325fb986243d36e0beecf2f9a9
SHA25684c89eea53817d3f590651c02c91f13cfd717955ec4ce46405ac2f3665a6836f
SHA5125ccdc1ea6279f4134ea5d8ef4958ec74ed06206865d4de8486ea842e4b2a0154830d5a812ccdef078e86a5dc37383302b769896a7e317a3004051756b28e6046
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
345KB
MD5310577c4544e49298b39ebd2a7305f1f
SHA1084d45efdf2ac90a13cb5fcfd0d98d65fcc91ad7
SHA256c49a88a95d373ccf2cdcf7675eb8f9d063259c40367b8c20e84ab29093b9540f
SHA512e1efc5773b9f81731a22df41afba61c764b9d0dd85bcafd14c5a141f896b2ddccb3c218d62799f71263602ffef0fd67c63a6f523d2488f82428287d1297d4cda
-
Filesize
1.4MB
MD5933b49da4d229294aad0c6a805ad2d71
SHA19828e3ce504151c2f933173ef810202d405510a4
SHA256ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206
SHA5126023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e