Resubmissions
21-11-2024 23:42
241121-3qavzazmfy 1021-11-2024 23:41
241121-3px9wazmfw 1021-11-2024 22:36
241121-2jed5symct 1021-11-2024 22:32
241121-2gbkgatjan 10Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 23:42
Behavioral task
behavioral1
Sample
3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9.exe
Resource
win10v2004-20241007-en
General
-
Target
3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9.exe
-
Size
164KB
-
MD5
0d5e53796965854c4d0f3b9f7408f4dc
-
SHA1
62de4000e914975a41837829c6c1b8be2883f33e
-
SHA256
3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9
-
SHA512
6ec4e852e9d4d24cc54ce11be16023ac012e18fe100922c8a904ae27af565c633a3318878e7044013ab5778a692d6480f9da63283859402a720e467b95484297
-
SSDEEP
3072:n4ppbC2Q2yvfzWbdMKa5z/gfvtT4bxKKEdbtk5y0itDI:nix7hMKcLGtT4bwkM0it
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 464 3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9.exe 1544 chrome.exe 1544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 2544 rundll32.exe 1544 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1704 1544 chrome.exe 32 PID 1544 wrote to memory of 1704 1544 chrome.exe 32 PID 1544 wrote to memory of 1704 1544 chrome.exe 32 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2256 1544 chrome.exe 34 PID 1544 wrote to memory of 2868 1544 chrome.exe 35 PID 1544 wrote to memory of 2868 1544 chrome.exe 35 PID 1544 wrote to memory of 2868 1544 chrome.exe 35 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36 PID 1544 wrote to memory of 2724 1544 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9.exe"C:\Users\Admin\AppData\Local\Temp\3edab742079945e0c1f82cb389c48406bb46188fdc0fd53c24526cc802ddc1b9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef75e9758,0x7fef75e9768,0x7fef75e97782⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:22⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1388 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1484 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1816 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:22⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3728 --field-trial-handle=1472,i,953089817408805387,10236906943894869024,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2028
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1180
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" pnidui.dll,NwCategoryWiz {31747c45-d2d3-4e6c-b497-dfe0dd59d12b} 01⤵
- Suspicious use of FindShellTrayWindow
PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5e2cfb3c2d1068be31735c18acfe862ef
SHA139bd2f34a03b2c32e6223a67318409a1e6080773
SHA2567fed9b682971fce9988f9aa619f2f510316141019a2d13873f1bdee54686098a
SHA512e247d2facf94f7876660164f4a520dab96e16d927a8cd30d1621b2a9620567e22762ba0e17548a9120a5c4340a5426468cbec889b4bb9f754392ba7ca29b2000
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9b030e6e-0935-41f8-bf30-939a876a6c2d.tmp
Filesize5KB
MD58e04194e7b953cbdf569113ce1b3a901
SHA17d3a3ce8bbe40b3496bd87f4c15c586819efec9d
SHA25689ecfe66d4153f456a9db1b7c906001e776fd8c3a2b7fa1efa7cf3242fb4bf73
SHA512b5d92d317788ef0dee533fc91c38bf4adc288b4848a8bbd45edef5a550cb80ee2f8eec860556f5af3c938b5e9b36841df87d0956602c5e194f9582c838e08e8e
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
333KB
MD543ba25ad70bea8e1cd6c49e24d0d5c24
SHA1213d053351f99892523d7a69683e1625101ebf21
SHA256b2e92b50eb924dc738ea4a28c4b11e70d1454ec4dd3780a7561424a4fbceb390
SHA512c6d86c65ed7cf47dde5a6eb9d15b9d2961781618e3e135d617bb8c1dac2c4f44b2c9ec7de4e1313bfed0a4b996645b1f847008524c2946e86c3cd606b3a05e5a