Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
13-12-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
chromegpj.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
chromegpj.exe
Resource
win11-20241007-en
General
-
Target
chromegpj.exe
-
Size
372KB
-
MD5
8cadd36be12b3cd44d9c50fc3008e394
-
SHA1
8fa3308090c3aee5f61da184655aea845b8761fe
-
SHA256
d621cd3aa3adc02c26daf4ffe4da673c4cad67a9d02cb6a0e43c278f8c290b07
-
SHA512
e07ad462c95c9bd59aaade09c9c1fb324026c4291bf57bbd657715dc3377d6ce2bf55ab52e7c334f7a42693774c24db2c46d3a5599c6dfa81c464a7149abff72
-
SSDEEP
3072:5n2Af+SLiJO+Y7mR9USl6yOiGB3PSQQivLXdn+mvo+vuChrZtwkYZBwOepe4PUe6:UE+yclwQKjdn+WPtYVJIoBfYgCiVII
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000\Control Panel\International\Geo\Nation chromegpj.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chromegpj.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000_Classes\Local Settings chromegpj.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2612 mspaint.exe 2612 mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2612 mspaint.exe 2612 mspaint.exe 2612 mspaint.exe 2612 mspaint.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3716 wrote to memory of 2612 3716 chromegpj.exe 83 PID 3716 wrote to memory of 2612 3716 chromegpj.exe 83 PID 3716 wrote to memory of 2612 3716 chromegpj.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\chromegpj.exe"C:\Users\Admin\AppData\Local\Temp\chromegpj.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\descarga.png"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD5c4733882a9d5071c28e036357f79778e
SHA111fb1d9c081a89e75517078597ed1c50c920cc4e
SHA256626aa0c3454fa40670ad329f95b14f10d3ae807cc4aae0c1ed95b85c186a8b4e
SHA512b2efadf7e77e01e3532bd784560783e45a0ad029be2523718903fa4e38807bd4ef5926aa59fe1a4b3624253dc42448e898ea5fb443fd168e694385708d60ae50