Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-ja -
resource tags
arch:x64arch:x86image:win7-20241010-jalocale:ja-jpos:windows7-x64systemwindows -
submitted
21-11-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-20241010-ja
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win10v2004-20241007-ja
General
-
Target
chrome.exe
-
Size
12.3MB
-
MD5
a77ebb32ac51d7605b33e3fdd8191f6e
-
SHA1
4e91fa8d20ee82aec600ea233a65461d6c5717ee
-
SHA256
32b8ac4b491b0d1be1f27c4e2531c4117aa928551b2ade3c0152c27808fedb2f
-
SHA512
5d6ffcf6490dbc71fa81bd79e7dbca3067630331aeb199208486d983e7d402b5ff3aac4ad57b46dcd965b006c721d0b2e7be18e0bb941fa1b4b6c47ecaef7762
-
SSDEEP
393216:jIFY+4quIREaCe0i5tNV8p9I5h+A9qZ2evV2rZBJi:MF5LuIxf9Vd5hNwZfvV24
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2072 chrome.tmp 2468 Appverif.exe 2756 ChromeSetup.exe 2524 ChromeSetup.exe -
Loads dropped DLL 4 IoCs
pid Process 2840 chrome.exe 1124 cmd.exe 2468 Appverif.exe 820 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2072 chrome.tmp 2072 chrome.tmp 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe 2468 Appverif.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 chrome.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2840 wrote to memory of 2072 2840 chrome.exe 30 PID 2072 wrote to memory of 1124 2072 chrome.tmp 31 PID 2072 wrote to memory of 1124 2072 chrome.tmp 31 PID 2072 wrote to memory of 1124 2072 chrome.tmp 31 PID 2072 wrote to memory of 1124 2072 chrome.tmp 31 PID 1124 wrote to memory of 2468 1124 cmd.exe 33 PID 1124 wrote to memory of 2468 1124 cmd.exe 33 PID 1124 wrote to memory of 2468 1124 cmd.exe 33 PID 1124 wrote to memory of 2468 1124 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\is-L5VDI.tmp\chrome.tmp"C:\Users\Admin\AppData\Local\Temp\is-L5VDI.tmp\chrome.tmp" /SL5="$40102,12023458,717824,C:\Users\Admin\AppData\Local\Temp\chrome.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\ProgramData\start.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\ProgramData\Appverif.exe"C:\ProgramData\appverif.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\ProgramData\ChromeSetup.exe"C:\ProgramData\ChromeSetup.exe"4⤵
- Executes dropped EXE
PID:2756
-
-
C:\ProgramData\ChromeSetup.exe"C:\ProgramData\ChromeSetup.exe"4⤵
- Executes dropped EXE
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD58ef4960e597ab67df52e45a0af124048
SHA18846ad8c2992bd2503dc831195898309d00c2bfa
SHA256849c12b99709eb16790e70cd04c615de75346b15fb9da325f87180b7a7567f42
SHA512f393da33e61a73e21e2e0504088d3728b3229fb823290031ff42ca1ef83e1d94732f35e023115d6718dab163175184852107bf7e946f7271bb3508af9d000842
-
Filesize
8.5MB
MD586eb69942ef2ee2bbebe934cde9eb99c
SHA141d96315325c2fd8c7b0b2a1e07df254fb715e49
SHA256127a82b5b879aa18eba9e35fdc820a0f19fd816e2825ec4cc5f385e4b7a244f3
SHA5120cd79224479f6b20a8e2edd865890f46a41d434a6403dec5524d11cbf2fd12408eaa32221fa10fc701c6e24cb1edb0ef602b176860b9a9db9dbf63a73556c55c
-
Filesize
209KB
MD5ef211dd68325f87395a1cf5232501880
SHA1bc740f18683d7e35a254de4d901e2e184883680a
SHA25697e32c456e5757fde0cc81de20e041865fd1cbcf42b5e90bf15560703d00bcd3
SHA512a2ce5351c451dea75f408cb5de215e6e89f51054f693a87abc59f4b2dc9a2699796f2ed6589305cda89d77131a727d779ea6df97eb11b1c9836f5b9c2e089299
-
Filesize
72B
MD55f7cbf20bb8fdaf6b0734986cf3de662
SHA1d79c9d6b4f1d9da0e075b9dd627197ba7f7b8576
SHA2561ac28dba3ec4d5083adaae3b7edba7ca2d0ef77869203b21ed84fabe0fb55c05
SHA512e5d0860bf9691aaf1cba76099c76451d4c029560d76677db9a4df5cb776aab5bfa58c882f7d64ba4e816b4ea1799a17a63d185795f5b587af216c9dde2bc6b8f
-
Filesize
2.9MB
MD55ee4539394fd28a6feb7c29fba663be0
SHA1cab38330de72d783a39bde9b47ab5990b8a2b793
SHA25663df72007101bf222c8c8f1e0522f2117285b34741be04920e38c725622483dd
SHA512737dcf5461dd1f5022d05fd1b5017b2a574ce77f2575f100feb2ec2070b16d9751e3cca3b609932e8eb342d5e81c4380d8b7f42a147ddce1e6ae832154b3519f