Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 02:16

General

  • Target

    d9d2ad004f71ee5e3dc5f0170b74a961fc5df4e187ea03a11788ed30a1a8230a.exe

  • Size

    1.4MB

  • MD5

    18669b21194b03105d0a9145635a1ce6

  • SHA1

    59d361b172cfb610aeef1e0ab6e2546b40aaf1f4

  • SHA256

    d9d2ad004f71ee5e3dc5f0170b74a961fc5df4e187ea03a11788ed30a1a8230a

  • SHA512

    0dff9b45ddbd0a80e05d3194f645a5f38c165ab904e01eb566a1406823c80c78ba0e39e7e81975299951d482ec31cf7514a3c2afd997b2bc656f6cd846be69d8

  • SSDEEP

    24576:PGU0HpRGUYHKaPUM0Hqy69NgA+iVvRuPpND5TqJ6y5eXt7dRfj5h6SY:OpEUIvU0N9jkpjweXt77L5MF

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9d2ad004f71ee5e3dc5f0170b74a961fc5df4e187ea03a11788ed30a1a8230a.exe
    "C:\Users\Admin\AppData\Local\Temp\d9d2ad004f71ee5e3dc5f0170b74a961fc5df4e187ea03a11788ed30a1a8230a.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im chrome.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im chrome.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2200
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      PID:460
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9ead9758,0x7ffd9ead9768,0x7ffd9ead9778
        3⤵
          PID:4080
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:2
          3⤵
            PID:2660
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
            3⤵
              PID:3908
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
              3⤵
                PID:4384
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=3172 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:1
                3⤵
                  PID:3604
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3308 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:1
                  3⤵
                    PID:4200
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3808 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:1
                    3⤵
                      PID:4064
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=4052 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:1
                      3⤵
                        PID:1396
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5200 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
                        3⤵
                          PID:2312
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2688 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
                          3⤵
                            PID:2656
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
                            3⤵
                              PID:4940
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5560 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
                              3⤵
                                PID:4956
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:8
                                3⤵
                                  PID:4364
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 --field-trial-handle=1808,i,7789950243510223131,17070923793304521214,131072 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2112
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:1552

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                7fa0ae905beb66e0935c027a0fec94f6

                                SHA1

                                65fef2340f888a04006054b7acef850a9be85fbb

                                SHA256

                                135c55e0e0f8d88a0fe91b3e99b5f3092bf6ef3cf37b0baff3a8f4b4fc6a59db

                                SHA512

                                24a74882ac6a0d4d8b50cd95f969b29eb7ace10c8d01e864c382e034a746b54c4a58a4d9b83c934b6758078f347de39245dbcbf1c668ef7a3ac47e4c35f7caab

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                874B

                                MD5

                                87b1a62d98e5c83196f1d6c659abc96b

                                SHA1

                                788b8013a84f606a446f88a72e4dc7ed612124a9

                                SHA256

                                ed5e35777b756b4685286aca6982c7d01543568cc37a474fd325a2b03aeacb17

                                SHA512

                                c57e86dd97250f3ba2df52c185ed0bdc5a0808ae0e240c5d452408b4f6a9a5100ac10c05a212655ae74f665d14daf362fc3964d33bd673bb1da524463e6b250d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                874B

                                MD5

                                3eff222776febff41d25f8f772146bf2

                                SHA1

                                897a80e47a2ed502813db91eabc402997f28bc25

                                SHA256

                                7ff79460a7337621b7f84c9df02ad39ae30dea97c793e44614f7bbc15438d9ab

                                SHA512

                                536c39a46b5dccac31a3439dd00f3f40750bf7a111bee08e61ef6b49fa0f7496b4c852f1e5ae1bc24dbfaeed665afa05b9dce430d82c00c454a5504a709ac927

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                874B

                                MD5

                                ba636d36e94f4fcd6e7ae816f62e023a

                                SHA1

                                a3ac257bc21486f3619d9afb98f4543fa1bce758

                                SHA256

                                7e4ecd59670c219ccc196a1973f27ed4cc3195bccc1ff84c966ebc41751eff12

                                SHA512

                                ffe81d4dd198d3397e8b4e3750fa4f102daa59b7e20959f550ed110d0ad75d44a214ed4d7e440d02a95a157b37f873cc9c0eecf371c4d57e2fb33b48030d9081

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                874B

                                MD5

                                53f7579a4c66c19144725ca2d08c6cf2

                                SHA1

                                b066a0894ddf917eea8570fa879165388e2a711b

                                SHA256

                                1892af33eacfc9deb7c3df3114c70656ba2d1a23f4d3309cf15ae7d50de9d2e6

                                SHA512

                                60e99a686617e4c6425de41f1543574ea5ed38b29610b9762c438e9b32ed254c8aa61fcff624f2f219df8583ccf035e966e679a4d9993e5e7e1c7e1910f75aa8

                              • \??\pipe\crashpad_460_JJTWKBOJAAYMRFYB

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/2112-214-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-215-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-216-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-221-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-220-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-222-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-224-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-223-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-226-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2112-225-0x000001B417A20000-0x000001B417A21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2312-173-0x00007FFDBC110000-0x00007FFDBC111000-memory.dmp

                                Filesize

                                4KB

                              • memory/2656-175-0x00007FFDBB540000-0x00007FFDBB541000-memory.dmp

                                Filesize

                                4KB

                              • memory/2660-159-0x00007FFDBBF50000-0x00007FFDBBF51000-memory.dmp

                                Filesize

                                4KB