Resubmissions

13/03/2023, 15:07

230313-sheh3sah45 6

13/03/2023, 15:03

230313-sfagcach8y 1

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2023, 15:03

General

  • Target

    KM_C454e_10-03-2023_htm.html

  • Size

    64KB

  • MD5

    98d6940a1a027e11cbdbc6fbd66809e3

  • SHA1

    4f4450cb7ea8161afef2b6eb2a3f515ee85480b5

  • SHA256

    3cdfa3cb709e2fe7c12f95720016705805eea6c7fa99d75e4ad27749b320d572

  • SHA512

    de332222953d7082342158ed76b19429468ef322ec880f326f15faf9d6815bfb28cbabcf1b293404530e128e5121d6a84fc6896fdcfa0ecb7c6e5638f4e6da97

  • SSDEEP

    1536:fyHhsOiW9hy4AJz3P/E4m8LSQw+vWXYsDpZNLvLaPx+Q/jGTif5BuMVW5NaqzdBu:fyHhsOBny4AJzP/E4hLSQw+vWXYsDpZk

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\KM_C454e_10-03-2023_htm.html
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4b7b9758,0x7ffc4b7b9768,0x7ffc4b7b9778
      2⤵
        PID:372
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:2
        2⤵
          PID:4724
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:8
          2⤵
            PID:4360
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:8
            2⤵
              PID:348
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:1
              2⤵
                PID:1464
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:1
                2⤵
                  PID:1512
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:8
                  2⤵
                    PID:1388
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4856 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:8
                    2⤵
                      PID:4820
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:8
                      2⤵
                        PID:2100
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4688 --field-trial-handle=1812,i,4975747395240920946,8341627730665062853,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3936
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3432

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        34a8f53ebaca73e9661baae0ef313fd4

                        SHA1

                        ddd7fdb9a2bd2da9c0c327c9469dbef0b44e1e73

                        SHA256

                        0a0ceaa315c7107ab27f510af234580bf041d029a55728356dd2cc14c86bc5c9

                        SHA512

                        68ac2080724fb08249cdae8a5bd823fda5ecff86a35af7a13303b28cb9821e0cf9bc2d66d27eb6a8a0b1c11426db0c4e5ab362b8cac2722ffd3b217ad9322e1b

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        538B

                        MD5

                        c5da45257393cf72545f4b37cefa94b9

                        SHA1

                        09bd96ad614d261da46375f4364d91f7d09d879d

                        SHA256

                        f81b5b3585ae672924343ff0107adf4d416a0af4a960c495dd388e1113571c8d

                        SHA512

                        8345f69b0183c50ff60f71ce23d29f08eba28572e87489d5d48927a3f9a50ad126c386ded1e82c9c3671be136499325f5d5a8507a17e1460074e69d9b377ff4a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        740da60793c9ff47fe19ee137515cdb2

                        SHA1

                        3a29ab860e90d98e413f9d1603aa1da40b405a9e

                        SHA256

                        3d3fdbf528028be1be80c6cd2217b5bfabc6e2477a7fe231eb37d0abe5901cd4

                        SHA512

                        7976e8f8b8bff8f1c819381a3785fd36107dd6d12e825498f16dffa2cd95f6943c6246984768c16fb6ecbf8ca9e5bc2239f3e05baa02c52248429bc35fbfcab4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        0c5d2ad3a19b35d54009b5bed19acc4e

                        SHA1

                        40e10fdeefa5a51fd1d0fb912eda90d71fb577da

                        SHA256

                        ab0cff7186c1c510231ae69b3fc1c653ac0b8168da8e1e627bb5a4bb061f5395

                        SHA512

                        855a5235755380cbc4ba613e825819df6ec0e97ddcf53bfb712a89b12eca3431e8b6be773b74bd0eddcb480132fd73a6769fd1681feea99259a0b212b005edfe

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        fa98a625148377afdcf3567b3d7fad79

                        SHA1

                        9be63d1c7a175176d10ebcbdc53a6f9d1d93393a

                        SHA256

                        4d649628473314f666f76ddd2bde2f6d6e0f6e148d25ee473381a6a4fbeeedbf

                        SHA512

                        5b34a54bca1224c6bf61b9d193449c0c99d145f20557e8496d84c4c294cf62577772bf9e5172279e2f9ba62f6f3ba2be9988f7d57be89e79f3b1877f3a039af0

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        144KB

                        MD5

                        918876405fe0d95febf8ff228e0df280

                        SHA1

                        b90b2478f30a0f4937a9ccb0884d017df044d9d9

                        SHA256

                        bf52536294a0a45ec144abf5bacb1f960aee3693ae626b9f5f46cf2731d4818a

                        SHA512

                        16155faf2d0aaf64397e664b46f43b244dd5cacb3d146a81d19c0ed6d11df5d584d0891ecf905d29d194073a61558e00acd5ef89c75d5107afbd14b420f068a0

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd