Analysis

  • max time kernel
    18s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2023 18:28

General

  • Target

    https://firebasestorage.googleapis.com/v0/b/fast-chess-377621.appspot.com/o/gfFgJeCLUZ%2FContract_02_21_Copy%2342.zip?alt=media&token=3daa6558-25fc-4957-9b8c-fc3746ad0eba

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://firebasestorage.googleapis.com/v0/b/fast-chess-377621.appspot.com/o/gfFgJeCLUZ%2FContract_02_21_Copy%2342.zip?alt=media&token=3daa6558-25fc-4957-9b8c-fc3746ad0eba
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:608
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72d9758,0x7fef72d9768,0x7fef72d9778
      2⤵
        PID:688
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:2
        2⤵
          PID:1736
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:8
          2⤵
            PID:1928
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:8
            2⤵
              PID:948
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:1
              2⤵
                PID:900
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:1
                2⤵
                  PID:1336
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:8
                  2⤵
                    PID:1408
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1576 --field-trial-handle=1264,i,4044333413724022491,6297228153201603979,131072 /prefetch:2
                    2⤵
                      PID:1552
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:300

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                      Filesize

                      264KB

                      MD5

                      f50f89a0a91564d0b8a211f8921aa7de

                      SHA1

                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                      SHA256

                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                      SHA512

                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      4KB

                      MD5

                      65a37f7d65bed1475f652749498a4301

                      SHA1

                      ba80711bf8a17bd432edcfc4ac6689febb6041b8

                      SHA256

                      a4f7e2751be81c505636a276eae03e0008cf00e301aa2a604356f257df040298

                      SHA512

                      2224966fd0a654360d0ab9cbff81b7bac8db5e53625fed2be3e5393c7882e7ddeb14f0bbba65d6606577661ca8a661f895477d9f8ea5d50299bb78d9d4bad00c

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      4KB

                      MD5

                      2cb0065f6a33f839f989a34be219b37f

                      SHA1

                      c12ac22351e43a354df17eb0a49ebdd256176d48

                      SHA256

                      96cc72d658ec4067a7eb7207ff660c009b3c80a6d256ce42ae5719268801b15f

                      SHA512

                      005dfbdf0b882481dcaa08486ba41328fbd37c677bdd92b0a6f38a79041796ae0f910c54ac44558d34f394a68f292c2c272af6db04c6f2bca51b629960ae7c7d

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      4KB

                      MD5

                      cf13ed3f33935d12341bf69fe09b41cc

                      SHA1

                      52b18e4bc8f1ad23acaf0b381501f72f9e7517f2

                      SHA256

                      402872aa83fa2c66e1f9706df297f0a9dbcb592fdd947f2471ab3346b79d675a

                      SHA512

                      b65ef0cfaf6cd9b205d49a51b7fbc6f564c89e49570f24c58c3a55dd46befbe67703037e1cee5d4c5f025d9e4dbd17a64c1a515b680d04c5cd3fc75a84ec3969

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                      Filesize

                      16B

                      MD5

                      6752a1d65b201c13b62ea44016eb221f

                      SHA1

                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                      SHA256

                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                      SHA512

                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a8655817-00ca-436b-b2d2-34f4351ee5a3.tmp

                      Filesize

                      4KB

                      MD5

                      302f191a23f51c474b766016a7bc65a2

                      SHA1

                      6b962367ac20318c0f6c2426fe69253ee9f257ef

                      SHA256

                      9085f523af09996bed9ae92cdc04c2f7a3d229b043e298a15e38f41f12a4a721

                      SHA512

                      b321bc723447b6dd255d77e6fea29b9234f71bc24194e02e0dc2580de9af87e9c726d131ea704ca5e305319c6f85bb422c9c707f01684c38e681fd984dac5f97

                    • C:\Users\Admin\Downloads\Contract_02_21_Copy#42.zip.crdownload

                      Filesize

                      901KB

                      MD5

                      42f14e11a095578ae08436040efff718

                      SHA1

                      338f0b7d8ba5db2645573e0b91a2db4e3e2991e4

                      SHA256

                      cc194682a5f7fd1144839917c2e7c2dff1d72492594b88e6761b14fe957f06ae

                      SHA512

                      97875440eba43448eede54335a298dc19f5f8f22ed6363522a383086db07c84b4a485baab8a91000e9691ce4ac4941bde12a710f349c8bac1415a4076cfba619

                    • memory/1736-56-0x0000000000860000-0x0000000000861000-memory.dmp

                      Filesize

                      4KB

                    • memory/1736-112-0x0000000077230000-0x0000000077231000-memory.dmp

                      Filesize

                      4KB