Analysis

  • max time kernel
    1796s
  • max time network
    1803s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2023, 15:06

General

  • Target

    https://s6.dosya.tc/server12/8c8mm7/Yeni_Metin_Belgesi.txt.html

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://s6.dosya.tc/server12/8c8mm7/Yeni_Metin_Belgesi.txt.html
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffca3619758,0x7ffca3619768,0x7ffca3619778
      2⤵
        PID:2288
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:2
        2⤵
          PID:4596
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
          2⤵
            PID:2144
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
            2⤵
              PID:984
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
              2⤵
                PID:3212
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                2⤵
                  PID:4156
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                  2⤵
                    PID:4224
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5024 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                    2⤵
                      PID:728
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4952 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                      2⤵
                        PID:2560
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
                        2⤵
                          PID:4736
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6088 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
                          2⤵
                            PID:3344
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
                            2⤵
                              PID:3536
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=6184 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                              2⤵
                                PID:660
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
                                2⤵
                                  PID:1548
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=6028 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                                  2⤵
                                    PID:5016
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:8
                                    2⤵
                                      PID:4108
                                    • C:\Windows\system32\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Yeni_Metin_Belgesi.txt
                                      2⤵
                                      • Opens file in notepad (likely ransom note)
                                      PID:4992
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6404 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:1
                                      2⤵
                                        PID:4944
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:4344
                                      • C:\Windows\system32\mstsc.exe
                                        "C:\Windows\system32\mstsc.exe"
                                        1⤵
                                        • Enumerates connected drives
                                        • Checks SCSI registry key(s)
                                        • Suspicious behavior: AddClipboardFormatListener
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4108
                                      • C:\Windows\System32\CredentialUIBroker.exe
                                        "C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding
                                        1⤵
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4776
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                        1⤵
                                          PID:2300
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x378 0x504
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3424

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          480B

                                          MD5

                                          1a1275f6ab01977a94c2556583129a00

                                          SHA1

                                          661838630ae8ce0385b2ac94b7d5793b203778e0

                                          SHA256

                                          800c6021e3299869ed93d7f846d06608eb79d8bb576c2abeb3d4a8cb569ef2e7

                                          SHA512

                                          3a4ae0971f141bf853539fec2d726e4659b8fed733ab660dd2409d0ec8343858c127db437019578334280482f0fa5bd161209722c1e126de1c7b9e659c9f40d1

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          5KB

                                          MD5

                                          d27e6dd28c2e19f17386fa78637c668d

                                          SHA1

                                          a97d8f832eadf346c4fcbb9a06029f0cb8fc156e

                                          SHA256

                                          d0da76782a9249956657e2e279015da80a3df2b9eb112e252c8ea1fab79e72a0

                                          SHA512

                                          fabe4682dba48c94e14cd1803eb069140230d05271a2f784936b354f2dda8ba6c33358fdbe78432677e557e97eee9383cb189e6c5af45599af98305f09484c26

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          774bd1c9cdf6cdd03fabfeae7449e473

                                          SHA1

                                          3c0f6c41ad9560d920c9c7730cfe5a0bf51d6d5f

                                          SHA256

                                          b896f15e31397fdc7eecf1090ec6c07bbc197df43abf72211dbf7b8b26767370

                                          SHA512

                                          25df09f8d962c23b5c6b682c5931fb899eacd13aff29e90bb5c0cb4755b33b0ca9dbe7facbd25c1c2b2274899e56bcc09c28bf7b424d5548d65de2074618ae6c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          5efeefa12491d59463810e253ea7afdf

                                          SHA1

                                          d4eae7d84345e4bd847998618bbc402db2bc8372

                                          SHA256

                                          12f149f4895a2347618c92ce828679c0c2b0a5220cfc151f26e6591913eb8de1

                                          SHA512

                                          ce661d140aff87d0787a77d4970245d0090df92a64dc5b485d7d0607afcedfdce5f0944fba4a21530a4f244ba0e4ae47403c4de60ea68a9acdf29337f9a53bc2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          9fee31f1d8a1c974d82e76ca37819114

                                          SHA1

                                          de07da4b9b796cf34ef5a2dab92d1b73db6eb883

                                          SHA256

                                          0ee858b1ab685bb561308d26046b41f30af078bcad7dabdeb32a2dfca958d27e

                                          SHA512

                                          362a895c1c82750504221531e724c2a767bb651f94cb96d40371e7ba8bfe7c2c9a455c33be30a5f6eddb1c64fb73710451a89f4ad7d4bb4ff01f3a39767b2074

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          06d980a3d46104151222fb2cfe5223fa

                                          SHA1

                                          0fe32b73345107a57a89106744be7dd363b82d4c

                                          SHA256

                                          bbed644db9b37fb92ec87949dd0d65bdb7b0d5800a458e14bbb228b9f0e17f0c

                                          SHA512

                                          ff41ab2c17f0a5a3a9144cb9d7e13b3df57929c78c4923b36e57219c5fb75033fe432623ad1825e7f9b82aac8a50b6d44653953fd820467c40275f3e28a8f258

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          906188811f8f9c7414e38ad5d48c0c8e

                                          SHA1

                                          5862e0122098bd6d00674814f4a39a247f90f2f4

                                          SHA256

                                          abfbafca895ceb7dee412997ba75457e5fc9a6681c51074ae48d9a87048886e7

                                          SHA512

                                          3af8a6ad7a8c0fc4557ffde286f5c4ff0944e5d570784025fe04da3b1e38d1dad0c115a47594ae3c65c5406fce355998a4ed92eff93c942c7a6b712d639f5014

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                          Filesize

                                          15KB

                                          MD5

                                          34b4f81e142e7a416ec40aa4df027854

                                          SHA1

                                          002bb88e3c37d91d754c3ea1abf2cedb1e3e0a6c

                                          SHA256

                                          62c5b56dba2314808d6bc68952f40c5f2d05bf336971262496daa3ad45d8b02a

                                          SHA512

                                          cfea6b0ac7740d403bacc043adb07a87ff7ce5aa29bda40e3ba575e10073e0d1e6fcdbd10eb11a752770c2672f20dd75767c8a9ed8fb487dc001ac8df57d2389

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          145KB

                                          MD5

                                          0ad09f06dd957648097f86ca6b3d57c2

                                          SHA1

                                          7c1a99adfa08ba505c210af35a66d72873fa3526

                                          SHA256

                                          7de35c4bb88124b43ee2e3c2b7e5d51a55724b6a86ff4f421aac0c9bbd216767

                                          SHA512

                                          52d9d750ca38c3fe2e49b56bea1db4a1e4db4711f34fad09dde6f1dc8a60a8b1f73562d7a8fbaa7cb8c53dde21388441cd5a936c30b0c925722542aca803143c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          145KB

                                          MD5

                                          3bd0d27f879531b027eef7efc5f40abc

                                          SHA1

                                          1a56a6084f63d853a73d280a58bff317fac83c84

                                          SHA256

                                          4d8db639ddd15f43f0078fe8d20a4a5624dcbce3a095c405d96421b164bd9f6c

                                          SHA512

                                          3ab814beddfe5c20cfd123d9f24169133a9cdb387f94e0292e8889667b0606142f3b7ea844d66617584fb7cfc81550783d77c74adedb85212d8336184cd057b6

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          72KB

                                          MD5

                                          1b8c8f5bf5c2f543eb718235c0bd293d

                                          SHA1

                                          74f64c9378f8f668dd0d29f49ded0731ec531f59

                                          SHA256

                                          f28e36e968b50866d90f8570dbf334c606006530fc00aa62ae5c25be394eb55d

                                          SHA512

                                          dab0de8c5bd7cbec038daa9282a06cc7cec0f9911a836211435430c4e05c6f546ab982be85a8e6e9b9c9e0fc8672f3ac497c0ef0f44d3d821501f2d8f4660ab0

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                          Filesize

                                          2B

                                          MD5

                                          99914b932bd37a50b983c5e7c90ae93b

                                          SHA1

                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                          SHA256

                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                          SHA512

                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                        • C:\Users\Admin\Downloads\Yeni_Metin_Belgesi.txt

                                          Filesize

                                          55B

                                          MD5

                                          30e8bb2d1319df7f97c6a359a81d5a6c

                                          SHA1

                                          ed8ff2f85c3fa78e0f68ad0becdf32712c62cc49

                                          SHA256

                                          da44da566b4f7bd00f5682f7d11f1a91c7f684a3267b33070f87cc41bec96611

                                          SHA512

                                          a73a3b0d7cd5f6a28fcc3c167412aa127bc40393ba01592d660f20da4593c3de63b86b520511217585bca457fc4d7767c51f3b41dae75eb03ba00f6cd7e5c786

                                        • C:\Users\Admin\Downloads\Yeni_Metin_Belgesi.txt

                                          Filesize

                                          55B

                                          MD5

                                          30e8bb2d1319df7f97c6a359a81d5a6c

                                          SHA1

                                          ed8ff2f85c3fa78e0f68ad0becdf32712c62cc49

                                          SHA256

                                          da44da566b4f7bd00f5682f7d11f1a91c7f684a3267b33070f87cc41bec96611

                                          SHA512

                                          a73a3b0d7cd5f6a28fcc3c167412aa127bc40393ba01592d660f20da4593c3de63b86b520511217585bca457fc4d7767c51f3b41dae75eb03ba00f6cd7e5c786

                                        • memory/4108-390-0x000001CA337E0000-0x000001CA33C71000-memory.dmp

                                          Filesize

                                          4.6MB