Analysis
-
max time kernel
81s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:11
Behavioral task
behavioral1
Sample
Loacker-In-Service Agreement.pdf
Resource
win7-20240903-en
General
-
Target
Loacker-In-Service Agreement.pdf
-
Size
82KB
-
MD5
f44d8307426645864e0a8cb14d1cb929
-
SHA1
7e012ebb9b52565167f28f7dbea8c3db2bedaa4b
-
SHA256
37e412adf7b3f6e9a5dd59289d50c82ca82d186b5693476ad8f7706d30c13831
-
SHA512
74e120a6fce1555ae5f8ecdde63ab2eb0ac55d9b2a3be5128fc13fcfd14dc899c3ab3553be7ccef171932be9512003425364090b9f965b79d2ba70c1e3c8b045
-
SSDEEP
1536:yIx0urO40B9vEMGxdBPmaUVx+YcqYnPVzuyPxupvMYm0/x4ACdf0O3qpM+s/lMgq:5quLMEZxd9KxpcqYdu0cvMYm0/SXOO3I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1916 AcroRd32.exe 1916 AcroRd32.exe 1916 AcroRd32.exe 1916 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2664 2732 chrome.exe 32 PID 2732 wrote to memory of 2664 2732 chrome.exe 32 PID 2732 wrote to memory of 2664 2732 chrome.exe 32 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 2204 2732 chrome.exe 34 PID 2732 wrote to memory of 484 2732 chrome.exe 35 PID 2732 wrote to memory of 484 2732 chrome.exe 35 PID 2732 wrote to memory of 484 2732 chrome.exe 35 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36 PID 2732 wrote to memory of 1716 2732 chrome.exe 36
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Loacker-In-Service Agreement.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d09758,0x7fef6d09768,0x7fef6d097782⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:22⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1036 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:82⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:12⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2168 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:22⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1364,i,11861152067805770399,5581598924543971613,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5bab99204a4ef4ff6fac0d27cc451bb84
SHA1bca3c644afb3abebb22ad1fba6adaa76d163be48
SHA25651d7fe676d042d41fac4ae0f701254bab0cd7939b66fadf316f0f99496625c5e
SHA5129d64e377d4f9a955b4c1d0c8402ea6df0bfecee9663ca24b0ae2f648929ed0cb6a1708845fee54520cf7968e69507716877c58954ef0009351cc4bda9ce63f89
-
Filesize
5KB
MD56c5026a17797b0d9cecc196bec46ac18
SHA1c6aca704ff6f12cf786db771e1b98dbf1a775c98
SHA25600ff837a2cecb2c1797a293ea657252513ae266e29d75bf74e595c78fcb85c9f
SHA51225fe3bbafbf35b0fe2085ebe892121ca8e4f705c9d483a03e02987ece7d33d2e3c633b9f28d735d9fbd2134e36d51e4353eebdb94237084e3808b77e35b0de1a
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
349KB
MD5d082346addfb603da861986d3270e580
SHA184abe1f0b745d15b9012ad1dd9bcc605bee00294
SHA25646432979441c4f3aed1ee454289825f71a44a5099251960c65f25d63eab4ecb4
SHA512da51479ce8bb25b26813672865ce9a4fb1d654ea64ad2734733a44dd3e141edfe1d6a98a3b14f31bcdcc510d7f6d843134a0151fbaab8fdfcfadfbff448b35a1
-
Filesize
335KB
MD5b17e6993064387af8b0e6cfeb454ccd8
SHA1fb9e5e153d0c4a8f91641880658e745d1d2c793f
SHA256bce4a64047496fb4adc98936649dcf325079dc79750277b2bca1028bdb539a70
SHA512ce0b8727f3616aa3f46ce5f4a14790dbfb735bc1235455fffa426e5e31d7fec4aad9039743e9986bace2e281909261b52e5db3b021aa5f47630f8c934afe2f67
-
Filesize
349KB
MD55cd4502108d46af144349b2d6017d96a
SHA1b85a4ac5c86bf5632574aa497c10329ffb94aa5d
SHA2561ddc2ce44cdb6804092dc0a7955d5e32d82843bd547835358b3caca57a6bd1ec
SHA512e5d899a210eb3af3f827e687482c84b49ffa8c6b23960bda776fbd24d9984a036a32d86c02ced1aa6f7008cc463201af1b85f366a8cb0ee9650d504cb81c13b4
-
Filesize
376KB
MD575dfe7b905275ff91f72d690d6d4affb
SHA16951a3c2bfd684d795a9d402b95d461faaa53c9b
SHA25666cdb370327a41ef1b8a50a2e4db58b839de81aaed900beb47e4ced91d8df84d
SHA5127872a22291c6dbd77aa496577b4458d2e5d8f51407b3f7a878683528cc3ed11eac5746dc1026b774fb595869fa04760b5f725fe8d1221ed6759945ad7701f3b9
-
Filesize
3KB
MD526930fdbce94322ad1ca33d3c3ec79f8
SHA1d3c4fd253b30b9a7710294c76599fe81e248d1df
SHA2569b277efcee8db79fbf2d2b48def6d71bd38278b5bdb23ca65c7d1adfc4c81910
SHA512d19ad19c52dfc1bc3d1eef93a81d853328ea1ee91af4dea8e96e43d75e8630efb4246a528fcfbe34f9df0a17874816fdf340c791be50cec7d066f29c17b0cbe5