Analysis

  • max time kernel
    966s
  • max time network
    969s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2023 18:22

General

  • Target

    doworiginal.php.html

  • Size

    3.2MB

  • MD5

    baa5798f8232023b99fa57521ae07550

  • SHA1

    378018b212bf52c4e958f5bb4ffa3a515b6ef9e8

  • SHA256

    f027e5c94a106926b7ebbb576f75adec9ef6e9a35b6e4b2d7b7fc48429d4148a

  • SHA512

    1d36fd6faf03dd8428b50db7b5ff612186ccccf3599f9d2065f0c85bdb31facc273b9aa4eba375623ea63b0c7fd27bdd41bfd19fe9fe85e8750456c73431206a

  • SSDEEP

    49152:4hl1hjv8Imh0112W1urqhDNgcW8ieuzlO6H:5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\doworiginal.php.html
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffad18e9758,0x7ffad18e9768,0x7ffad18e9778
      2⤵
        PID:4668
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:2
        2⤵
          PID:3244
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:8
          2⤵
            PID:2208
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:8
            2⤵
              PID:5012
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:1
              2⤵
                PID:5036
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3248 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:1
                2⤵
                  PID:4092
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:8
                  2⤵
                    PID:2224
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:8
                    2⤵
                      PID:3148
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:8
                      2⤵
                        PID:4800
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=928 --field-trial-handle=1812,i,11452769119516421166,13227447664821987018,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3436
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3448
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:2408
                        • C:\Program Files\7-Zip\7zFM.exe
                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\File`-.97088700997.zip"
                          1⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of FindShellTrayWindow
                          PID:2656
                          • C:\Users\Admin\AppData\Local\Temp\7zO06AB7687\F´48996407.exe
                            "C:\Users\Admin\AppData\Local\Temp\7zO06AB7687\F´48996407.exe"
                            2⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2224

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          a53571aae9440e04d38279cb435c3614

                          SHA1

                          124ca648dee4f5a39f6246ba9e6b892d762582fd

                          SHA256

                          450b1395d5fa7c6021feb0326566286fb69f5f99afcf998069b861ebd213c943

                          SHA512

                          9864f4a5c15b4bee1d808410ec114e8a3e1ad82265fe5b2c7c4366eae80a3efb4f9045de717f364cd469e3c6670cf4e717f4e80d311fb003286d278f9ed6ffde

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          27cfdd7b6602222406765ddfaa11fe4e

                          SHA1

                          fb7e92d0c9cee0549e8cb44d676062c81e45d7aa

                          SHA256

                          23659a760d6bc7590c33a385697c8d47406e29f49cfc37ea6218673fe14437a7

                          SHA512

                          0dc99a985101d1a21f7ddef7dc82a9aba4aae217c3e4b2220ae9e7ea39580f76abab612d82809a07f44308afec7873b436bf32abb9752b2b06fbfd010edad438

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          d1b2d2a8e21f78da71eaae943cec0cad

                          SHA1

                          469c636feddccfe14d02b4279ebae17b2ff56821

                          SHA256

                          d3646183607cc2886cf3545d6747c96550edf6dbb6f30911216c589af4d7c3dc

                          SHA512

                          c53e5e40e14780f36645fd5d5b0489e9c0ff9d81a5682c1c079bd3f0bb8c692cf7b17d57975e62416e75d4c922ded89ca63f01e861dffe112fe7ef2267720ece

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          867B

                          MD5

                          219b6cf41002598bfc1df5b8dcde8844

                          SHA1

                          99ddbdca1050ad2da971c50019efd15ceab2b258

                          SHA256

                          fee0ee9addaf144e417c231c5a5596717bf83cce33185caf889dbaf0ca0b72d7

                          SHA512

                          2f00d834407f17aa3d1a18d33237c0af54d5f0550ceda7ead1d4d3212f064894f7aa8680c28a8e4cba8586ca4c2f51ceea8c91e998b74c9c68c99e53da80fb5e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          b5427df379d45b5d0be0a1fb22158d0a

                          SHA1

                          ec9be0047005fc396ba5f5745334c7dfa4f562fa

                          SHA256

                          c4593cc44d2260c7168b6bc5dbd8279003d6e8dae2065fe4e8fd939dd3c6002d

                          SHA512

                          a75fd150ed3c6228988430ac1d6c35842c26d144f115cfdec0f5a0567ed3a7f3bbddc6941b7e08bb10d7c53eae597a1efcee0a941fb0a7ec0ae7273e8eda39ba

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          6adf659f6f5e093ac2bac10c03c0440b

                          SHA1

                          890ef41e5ba3c6051b2e29185160ff4c43b792a4

                          SHA256

                          1b2200c7ffef0b718ce97c68d2afb4b5c745f2956003592b1c3517005e52a227

                          SHA512

                          8352060b57fba888838dd006082597cb035c0895fe37756eb706a0b1dd8f3cf6bbaf5f646c44b1ee232495effbc29be4caa4bc61275954a6cefe1de9a492e12f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          35542442a99f3dd4c66d05e24b7ab9dd

                          SHA1

                          17dd7c4c6c3f4874d18938975364d6bc1cb2346f

                          SHA256

                          7e20f1069bc86a3b0594ab3f1925144f35417c48dc062dcf88199865af88cacf

                          SHA512

                          ea09fcc2022a0ab1a76f6eec8caafa67124efb888f639b20dca099172dd88f22618829c0312338d2ec1c4990e20ff97f0a58e2d2e9891fc28601947d313c5434

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          22889f00d09a2a810fc4b6c407a23fc5

                          SHA1

                          f5e956a28ce3a5affb919221e40bf564df37a9ac

                          SHA256

                          ff9cdb339d29d7c9729b626858bfecb41ecb039e0afabc27553af10262f29fab

                          SHA512

                          f1e77b0073423752a0994ca23a28e0636ceb699f357b2cc5b0463969f7a234b56edab89d58812009cbf9b57aa49831141fd75483e988adb9566ac7823593193f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          ff4410bd290930b86cf68c32b0e59ba9

                          SHA1

                          8e072309322caf0bb91b796dba3fce0af5f2ec7a

                          SHA256

                          34c4ca18da35ef75fad75c91b8404f2d2fe0e10c68d15c77b74a06d3babba33c

                          SHA512

                          b12e5f3bc64d59b904be406eb7a783dd1271a2f93e84e30574bcb36fa2b9b342386827bd462afc1f9aee9fa95f03dc77ca159fd8cffa523bf74548b3eb22fd1d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          144KB

                          MD5

                          ede4af270053f2fbbf97e14a57009aa9

                          SHA1

                          ebf0b1274b8ffdf1c9820eed075f0b98cecff1d3

                          SHA256

                          e865805aa19c34169d26130d9cabdaa7ded863245c86960a1667f954e87399a3

                          SHA512

                          fb2d71a86d3e847fa0a4f2068da7bfc8ff091823ef989e58240325a0629517e861146579b83f9a53dbcc363fb49bf30b8a99b2f57d23199da29a88ff6b1533f0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          144KB

                          MD5

                          01249a57c32c2bfe2e1d3d1ae3abe3c9

                          SHA1

                          18b987a024b947c9e2c5ec1acf10aebf97db3216

                          SHA256

                          e77275938ffc53a55dff5e2a1effae1632a1039d6341c55491499493acffeb1c

                          SHA512

                          25ee899cc44a197583edfed23c709cf3273b7c3b9cd04d1264de273e0d1bd3c62c057018910b943cef7982f2e35122dd8a69dcd47bf2df182689645839707da1

                        • C:\Users\Admin\AppData\Local\Temp\7zO06AB7687\F´48996407.exe

                          Filesize

                          503.3MB

                          MD5

                          6f62ef69cb0fcb9daddd3efbd7d43137

                          SHA1

                          c7fed536522c20a778f8560c1646ae5a3b655d5c

                          SHA256

                          d4e42960c72e001b2a9bb72cd6a50ea2bd4d95751b674cdb347fa49a4c9efe2e

                          SHA512

                          259222b18a62b6d7d5807d00e372403edf8d2bfcbe7ff8568b1eed614d6c802fac5b3f05d51ee9d07b1a5c9883bf8c3932ad09d28ed97867f37f3ccf5c210a7c

                        • C:\Users\Admin\AppData\Local\Temp\7zO06AB7687\F´48996407.exe

                          Filesize

                          503.3MB

                          MD5

                          6f62ef69cb0fcb9daddd3efbd7d43137

                          SHA1

                          c7fed536522c20a778f8560c1646ae5a3b655d5c

                          SHA256

                          d4e42960c72e001b2a9bb72cd6a50ea2bd4d95751b674cdb347fa49a4c9efe2e

                          SHA512

                          259222b18a62b6d7d5807d00e372403edf8d2bfcbe7ff8568b1eed614d6c802fac5b3f05d51ee9d07b1a5c9883bf8c3932ad09d28ed97867f37f3ccf5c210a7c

                        • C:\Users\Admin\AppData\Local\Temp\7zO06AB7687\F´48996407.exe

                          Filesize

                          503.3MB

                          MD5

                          6f62ef69cb0fcb9daddd3efbd7d43137

                          SHA1

                          c7fed536522c20a778f8560c1646ae5a3b655d5c

                          SHA256

                          d4e42960c72e001b2a9bb72cd6a50ea2bd4d95751b674cdb347fa49a4c9efe2e

                          SHA512

                          259222b18a62b6d7d5807d00e372403edf8d2bfcbe7ff8568b1eed614d6c802fac5b3f05d51ee9d07b1a5c9883bf8c3932ad09d28ed97867f37f3ccf5c210a7c

                        • C:\Users\Admin\Downloads\File`-.97088700997.zip

                          Filesize

                          2.4MB

                          MD5

                          c44b2fc1ea2234d58b1916e110c7f52f

                          SHA1

                          08adcea0bcb29a86e5f4891bb207d1f751164aaa

                          SHA256

                          15bb19b6f7db0fb2a3ee70469eb0ffe8b1779a766d4e122424f21d02ba2bbe04

                          SHA512

                          e836166368ede8dcd01de9708a274bd907452ee69eeeedae810f34bf538b7b6a2e62746d9cd77c423eb4aaa256f6c5c9fd98a2016114ab9ad7c81ebe0257415a

                        • C:\Users\Admin\Downloads\File`-.97088700997.zip

                          Filesize

                          2.4MB

                          MD5

                          c44b2fc1ea2234d58b1916e110c7f52f

                          SHA1

                          08adcea0bcb29a86e5f4891bb207d1f751164aaa

                          SHA256

                          15bb19b6f7db0fb2a3ee70469eb0ffe8b1779a766d4e122424f21d02ba2bbe04

                          SHA512

                          e836166368ede8dcd01de9708a274bd907452ee69eeeedae810f34bf538b7b6a2e62746d9cd77c423eb4aaa256f6c5c9fd98a2016114ab9ad7c81ebe0257415a