Analysis

  • max time kernel
    65s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    16/02/2023, 15:41

General

  • Target

    http://kpi-offscan.kpi.ac.th/elib/cgi-bin/opacexe.exe?op=redir&lang=0&db=Main&pat=%A1%D2%C3%C1%D5%CA%E8%C7%B9%C3%E8%C7%C1&cat=sub&skin=u&lpp=20&catop=&scid=zzz&bid=1115&u=https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1675615245021x188597381800609020%2Findexxxx.html%3FtvePhp0wGKBEaVy%3Da2VsbHkucm95ZXJAc3RhdGUuc2QudXM%3D%26

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://kpi-offscan.kpi.ac.th/elib/cgi-bin/opacexe.exe?op=redir&lang=0&db=Main&pat=%A1%D2%C3%C1%D5%CA%E8%C7%B9%C3%E8%C7%C1&cat=sub&skin=u&lpp=20&catop=&scid=zzz&bid=1115&u=https%3A%2F%2Fs3.amazonaws.com%2Fappforest_uf%2Ff1675615245021x188597381800609020%2Findexxxx.html%3FtvePhp0wGKBEaVy%3Da2VsbHkucm95ZXJAc3RhdGUuc2QudXM%3D%26
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1916
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef69c4f50,0x7fef69c4f60,0x7fef69c4f70
      2⤵
        PID:1648
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1320 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1544
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1004 /prefetch:2
        2⤵
          PID:1496
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1820 /prefetch:8
          2⤵
            PID:1816
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:1
            2⤵
              PID:2092
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:1
              2⤵
                PID:2084
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
                2⤵
                  PID:2180
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3272 /prefetch:2
                  2⤵
                    PID:2416
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                    2⤵
                      PID:2460
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3448 /prefetch:8
                      2⤵
                        PID:2524
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3596 /prefetch:8
                        2⤵
                          PID:2532
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3904 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2624
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2632
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1720 /prefetch:8
                          2⤵
                            PID:2752
                          • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --reenable-autoupdates --system-level
                            2⤵
                              PID:2788
                              • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe
                                "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x13c,0x140,0x144,0x110,0x148,0x13fb1a890,0x13fb1a8a0,0x13fb1a8b0
                                3⤵
                                  PID:3048
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2596 /prefetch:1
                                2⤵
                                  PID:2796
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2128 /prefetch:1
                                  2⤵
                                    PID:2860
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,11630431388719535635,8006103697163004752,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:1
                                    2⤵
                                      PID:2956

                                  Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8

                                          Filesize

                                          1KB

                                          MD5

                                          d02d993c04f5bb559db79ad34ad6d951

                                          SHA1

                                          ea52daa9c8cc293fd1d34f818f9f9603ac35587f

                                          SHA256

                                          858f9672189196ec20a33415cb34aef67d8c27a5abbeeb83c48c0409a31dd825

                                          SHA512

                                          d6b5122c41b2f14acfd5377996a8adb222cbc29a288276055d591007ec49dc8f13e463c99104ab1686ff4ba6974bfa7628cd4caac4b8805ba583ce42209e7757

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          61KB

                                          MD5

                                          fc4666cbca561e864e7fdf883a9e6661

                                          SHA1

                                          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                          SHA256

                                          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                          SHA512

                                          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                          Filesize

                                          1KB

                                          MD5

                                          00ccd517743aa254b592a594cdc345b8

                                          SHA1

                                          0187d39dc1e3bb6c08351b854b8afdb13a6b4f7b

                                          SHA256

                                          383dbc6e3af3db1377fccdc150abba58a7a329bb60c8bfdc1059f25a5ba2a245

                                          SHA512

                                          c425bc915d0f04425713890f1dabbff5acc6dd842f6920d9120c9e53f46581110ad8ab01617d7d2b4d197baa5a639bdf878f9bc54edb13f53b34e6ddc087686b

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                          Filesize

                                          1KB

                                          MD5

                                          6bbae51a44cf23494fc50d8110d70a20

                                          SHA1

                                          9dea838ea649811e2048419c3c9cd068e7bee83f

                                          SHA256

                                          93ff10b404c86cbe12d02bf06e29ec579b3f2c009547946ad07dad28f0da8195

                                          SHA512

                                          7adc167ebfb2f535d22f9b90b67eb7c25bf69de98fb87e540583b609923d6032ca3686aa46ecc488d09b2c167e005ef8111489d7758b5fd2955ab870b885e060

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D03E46CD585BBE111C712E6577BC5F07_824D601B4CA63DE5D34E27269DEF752D

                                          Filesize

                                          471B

                                          MD5

                                          b77dd19016fb6a5c90f777364efe98e3

                                          SHA1

                                          9f011fcf34e0a30e0820344576359e919faade5d

                                          SHA256

                                          b579222d46c5417091dabf6227486e96c75da2a7de7f2265606f0465ac069aff

                                          SHA512

                                          c2268c59019df08352b65188084dda0adb7ab8ac28757ef7ef197a99c95fd61adeb1fcb5c80f24713da6ae78edc40513ccafc96033f1525ea868120398c15a74

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8

                                          Filesize

                                          438B

                                          MD5

                                          8bbd8504f976d8a9f92abb4fb29932f3

                                          SHA1

                                          a4d6875a20cb8ffcf014ba849d6e2f4beb2862b8

                                          SHA256

                                          54d1a9c7c7ead629df241bcf3f898fff9cdcd13ff56121265b0fc2bfdabb99dd

                                          SHA512

                                          88bbc6228c8c60627c5c1eca1591d2f1239de4fc3be66d66646aefd03408598bde96df5c42c5d10a1c08c155bf4a7f790d621fdc9a6df26df066badc3e27dcad

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          e56589058783318137857815a8327aa7

                                          SHA1

                                          9db741d68271b617ff7bce09559aa079728e69e1

                                          SHA256

                                          4ef85fc80710da19563021c2735be11d401c870deb560feeb04237621e996f7a

                                          SHA512

                                          ca4155e7f4ac9c51cc8b769814dfbf58c6e5954f38edb13f9abd63cb5f8a13884a8b873aef222ede1a891050a93c57fe52cb4541b793c52f5657f96cf4c3079d

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          112d24b007359d561fdd2fbd4519f198

                                          SHA1

                                          529cac7f5e44cd8518eabe1dee15cc462caab506

                                          SHA256

                                          6f278e373405d3e72c18c74d76655f650c650c190cdf15bede73312cfd2297af

                                          SHA512

                                          b6ea43497e7b215060bbe2dbb2106f22e3c80cda461ee3a23ade92d0ec2dd8391ba3b23e5a649fec437a0e729a0a5b5952acb6fb1a04486f366c8bf3c573d969

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                          Filesize

                                          458B

                                          MD5

                                          b1121c6b91e5c2cb286962e2cb1f8b7f

                                          SHA1

                                          de6c33c1ecc5939f73664e7e97dc88e66b0b036a

                                          SHA256

                                          a61b33cfc13355102cab902acfe50370f4323037ce75e15727c62f95017628ff

                                          SHA512

                                          c4dd1db06c1dfd22043a6c203f58b2c0692f4304cb0622d078bf8057a881899a51ba7865267a3b12b997d8e90d6c7e4413782a5f136122b75ae6a845209f8ff3

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                          Filesize

                                          432B

                                          MD5

                                          41a5a0172dc0cee8867e2f840b47f486

                                          SHA1

                                          c1b746ee5f68208afea43b4b39bcadcf6f2c1d7b

                                          SHA256

                                          1c323bfb000e5ea6f41a581a55526200d59234e83051228c2511ba07f66b7937

                                          SHA512

                                          7ad7c37e0d259b31042a3998871f9cdb187cf76cde5e688a461ffb1954abaf6a21d71b2c7c49659913b370fedd90172ed3357efba4ca9f4b616480ca16c4d18f

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D03E46CD585BBE111C712E6577BC5F07_824D601B4CA63DE5D34E27269DEF752D

                                          Filesize

                                          448B

                                          MD5

                                          a45689a4006ab8a28290bce453bd3731

                                          SHA1

                                          6bc45308f7b954abe4954bc13b1a760abc9b52ae

                                          SHA256

                                          7ca5b7e0c6b3d8863b9d27031ab8000a6fbb083210cf4bb2743493429e7e079c

                                          SHA512

                                          643d756f37dbc55304a95eed234b61d3f735d8179cb4260d020c6e64855bfdafd55b28d3d2816956567882e264796a8dee818b81343f6811336aacbf7d820150