Analysis
-
max time kernel
170s -
max time network
266s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
GWTool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GWTool.exe
Resource
win10v2004-20241007-en
General
-
Target
GWTool.exe
-
Size
226KB
-
MD5
a149942a72d5a5bce221bd02f19bc5b9
-
SHA1
35bc0fdc57a1d0366a9d1ba809f47aac70be1c5c
-
SHA256
1f0602cc7bfd8228a57761efc0e96ef44076f14b7b83ef1b97df2bcfecceff4c
-
SHA512
a222a79f1c9ef12fdcf5522a906d0e7cbe134d96a4d784cf090952f484b097fcf0805cd6e1a6d3c5f1b7ec378b5d8842c9a3025788f384bd8c280164b1c898cb
-
SSDEEP
1536:ckg4mk4dimaqp0RaVbJ1KswHkg4mk4dimaqp0RaV:fRYukbJ1SMRYuk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GWTool.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1900 1580 chrome.exe 32 PID 1580 wrote to memory of 1900 1580 chrome.exe 32 PID 1580 wrote to memory of 1900 1580 chrome.exe 32 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 820 1580 chrome.exe 34 PID 1580 wrote to memory of 1740 1580 chrome.exe 35 PID 1580 wrote to memory of 1740 1580 chrome.exe 35 PID 1580 wrote to memory of 1740 1580 chrome.exe 35 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36 PID 1580 wrote to memory of 1440 1580 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\GWTool.exe"C:\Users\Admin\AppData\Local\Temp\GWTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6739758,0x7fef6739768,0x7fef67397782⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:22⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:12⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1148 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:22⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1580 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2324
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x140207688,0x140207698,0x1402076a83⤵PID:1956
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3960 --field-trial-handle=1488,i,11662527968557362409,5399352551486360313,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
168B
MD5638fc979110f9b1694c087f31dab7b3a
SHA166254810a189a32e9149496b7108157064bdbe9b
SHA2561398f03fef3c9c0fa6dbf341ba4a6e8268189cef66f589e972bd9e0c98a35610
SHA512cc843cd4fab3650e481d866f2a6431a6b19a225f2aa70ed856c6e55148bb30f06922a387d1ad4546de7a37c3850e32d8e7c7d545715995de5ca90b5705e6c722
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD529b8dfb14c978629c4f4b2ada320b205
SHA17c8b34a1898c0d5bc2094677cb3c9c2d0de706d7
SHA256da7fdde91b9a8638d54f56c8807dd05ba30fa94c837ea1468b85051f469567ac
SHA5126d11692f8bbeda95ac5d004b9ddfc57b9615b99d42760a2a9b9006f1b2d94369a1d23eda70f25261a2b5df07d476b259e1310a20858db997fa1dba1bc6613a90
-
Filesize
6KB
MD51ed518a3608fafe64d0d8eab904eadf7
SHA17eb819541e7e60fce9020dfe1191361c12be628d
SHA256b55005f95886860cf3af9a993080034b2e3c959fddb177e63f2af966dca4d27f
SHA512185abdd47c5734c82fb056d95216affcf4250e8a92d6937a4e53ffa88ed9c4cc9d6310bc2a81102029bf34e0d2005c6f53e773cec3e0dc46686e39c4a4d52bda
-
Filesize
5KB
MD587c093479680a72781588cf05f51638f
SHA166d117b1db2e28bb904e1412558f6b2f87a93a34
SHA256ac9d786e40e7f610a73ee6717f640a41bc2fcf7f6b3230bef591487b2fc266d8
SHA5125526fe0aeb94fd601dee6f256498f2d9957020895cf6f1c1c396318b76e3efcf160719e0362dad0bad7e7711b589818890269afd3784e85d75dd386e7bca28f1
-
Filesize
6KB
MD52d48333039d4050117d5388be22cfdd1
SHA122072058a0042c45d09d2799af1f3ae38d1ef368
SHA2567c8c790a372b3d7713b245e6b53e0502ec9d9100a068d32900aadca1912b9ada
SHA512399379498d94b313cb6341f8e029946f4884ae822d1590e6ac39859a07ffed1bb065b6a9dd39a396e7b77e9cca5154ad2703ac5d752fb84d92b8b48a5a59528f
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2