Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.zip
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.7z
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.7z
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
B1C90tuveZ9jFGZ.exe
Resource
win10v2004-20250410-en
General
-
Target
17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.zip
-
Size
548KB
-
MD5
e1835210a12753a043c0079efc2dc26c
-
SHA1
19a8533f7f163b23bdfbd358d3a29557c896517a
-
SHA256
9d3e402ea8bba91daf61c40cdf1d0e8980bc527041c272b6089b194adc423b47
-
SHA512
d6a0107e08aa8a31baf65e91fa8830e7dc74a9d85256b94a42d060be02514c35d05878d4cd37d0210690be809d9f60797d427a7ff768d931c76b3190d1f050b1
-
SSDEEP
12288:wO0Ph+HBBczMcQttr6ntHoi6SktdheKQL4J9I50yFLRTj7:nOshrcQt5GtHo6ktdQKQLy9I500j7
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5484 WINWORD.EXE 5484 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2540 chrome.exe Token: SeCreatePagefilePrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeCreatePagefilePrivilege 2540 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5484 WINWORD.EXE 5484 WINWORD.EXE 5484 WINWORD.EXE 5484 WINWORD.EXE 5484 WINWORD.EXE 5484 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2444 2540 chrome.exe 90 PID 2540 wrote to memory of 2444 2540 chrome.exe 90 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4892 2540 chrome.exe 91 PID 2540 wrote to memory of 4860 2540 chrome.exe 92 PID 2540 wrote to memory of 4860 2540 chrome.exe 92 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93 PID 2540 wrote to memory of 1440 2540 chrome.exe 93
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.zip1⤵PID:3512
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\FormatEdit.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0x88,0x108,0x7ffbbdd5dcf8,0x7ffbbdd5dd04,0x7ffbbdd5dd102⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1836,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1844 /prefetch:22⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1428,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2232 /prefetch:112⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2376,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2396 /prefetch:132⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4124,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4156 /prefetch:92⤵PID:6104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4640,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1988
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD58ea99d2803575935356db215b60cd585
SHA19b9e9219d4af954b418f1a90cfd5825cd152dd77
SHA256227ee944fb54b44ade53d5ac5ecec45468ce8fd1c021b6e882712f828c6d41e9
SHA512cc32d27304e99cfb78e954e1263e35afd439fcdd92e34aff9cb6de7eabaee1af83b3bee2c8c51aa4cf97d9e343f81e15a32b991e039742f1c02b26a39a28a1fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5391836a0f4e6635921102d39a396e626
SHA15bb3d0ec3550f348a3f09cac2f8c23746b38db24
SHA2567973b2e682e8a4d8caedc80a86e8c0aaa4cf042989b8cd9f1d5abbcea6d3f611
SHA512d52af1bb4fd1777bac0e4c613d83fe6ddbe361105cac60b766ded97c18514368b03c156fc33e6db69193ab9f1aa08534e4f3aa789b49b3022ca34bb94b2e1fff
-
Filesize
9KB
MD55d8834480390b7aebb539d5b81b9dddd
SHA1539aeb8a503a60f02988c760974845d072424563
SHA2568a40fe807d076392ea9ec61938b9daff6eb287033cd6dc266b6aa9473ccc4d16
SHA512fe2611a24ddaa6e9d3bae126056c49ac5cafe7ca3955b66a8f293c22d9fe22cdeafdb8101c318ff788c4919f61231dbe80d7ee6ccd3cf5bea0c8239b994f6894
-
Filesize
15KB
MD5eebab84524ada6b11bec74ef3b554a3e
SHA1a8ee6890df96ad384238a3289a026d2c55affd9d
SHA256df5b50bc085da09dc89536fc118eeb3415e5316001315555370003d63479c72e
SHA512bc87d844be774d51d93ee6d56653f792aa9d81ec4d35af284c580adda3d05252ce500fc208098f12e160d9ac0233222134513bc0929c3f1b8cad0e12ff6e429b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5fe176fa75b3e4837dbc3b78f1cafb4e9
SHA14e455a0c0b170b012be16d1aa595a9a30655544d
SHA2568781c55822af1e9ff19ad3c9e33cf1c7ac02594a27f619fb5416ce489584bdf0
SHA5129e8eb9c379c2356ae541b726740b24f8e933771e2e7b7c4066669e3a1b5b7b9cbf20b05969e6f4761536a82e9d3b393fc9cba2bf1076d6c390f74c8a749029f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58678f.TMP
Filesize48B
MD5bf37b14ae2c71c377cbfae944682582b
SHA1bc78308da68a3644c95a83a3769b07b805c3a2f1
SHA256aed935735ddd550aaa7fce222e454948807adf3dc568109ca757c0661c8211eb
SHA5121a932c25da5db46380c803e834813ee25db66d890da81bd4721846be5be34e03a48c4010e2b8214f17f60f5439f8d01650fd4fd15366ed4d02049fb53e231a1c
-
Filesize
78KB
MD5502e6f6938bfb05eb7b7aef1f5e3c222
SHA161bbf76a62c8c8d0c549696872169041d4329865
SHA2568f60b8978cc1d3f117e7043a19d50ae8620b66223fdaf5c531a390568fe15f75
SHA51262516a400a62e69a2ce97138f183c2a2c6db7a9109a8f1786fdc7cf4dc247ba29f917b004c7a412e72aeafab4ce0b2b0ecbc23bb5c73ff386ecf6b046415550d
-
Filesize
79KB
MD5c9fffacb691c5f011f726137baf9c077
SHA1945f00472340c973bfce8dd00bf40ab2d4cffcf9
SHA256d96a7f194435068011210505ad84eae3f688d75fff5392b54ba1322f757a26e3
SHA51248ec47ee0554418124911e61937ed16074cfdceb4672fdec2cd0b137a132d9863a140a3ecc7a839ef2df97bf4d4b6a6424c435c371c7ce8fb7009c5e8fb45551
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d