Analysis

  • max time kernel
    692s
  • max time network
    693s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 14:24

General

  • Target

    treppe.dll

  • Size

    1.3MB

  • MD5

    7a1084a531c896148a2aa1f4a5f2740f

  • SHA1

    c15c2ad7d20daa26c06e113aab69fc20b8c95ee5

  • SHA256

    ca9894f88be8f06524a09209c1020abbb42bb4d193757ef8ba1aa3abed02aceb

  • SHA512

    9d206e13051128ebae9292384ea434b76fa40df4ba08310169be6c396f406f9c3921e4e8328011efa06eb78472cada8493e889a863274322e37b2fbc4e6b4fc7

  • SSDEEP

    12288:zNfg7ayYgZHRXnW0liwD8L9GlB/TSJRBzfVE/+AqD0eBkvkJl6h4MEFvhAkRoAG5:zRTyV2ZxybQvh9RoOUzux82V8P

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\treppe.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\treppe.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\SysWOW64\WWAHost.exe
        "C:\Windows\SysWOW64\WWAHost.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4332
        • C:\Windows\SysWOW64\whoami.exe
          whoami.exe /all
          4⤵
            PID:5540
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig.exe /all
            4⤵
            • Gathers network information
            PID:4628
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6db39758,0x7ffe6db39768,0x7ffe6db39778
        2⤵
          PID:968
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:2
          2⤵
            PID:1488
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
            2⤵
              PID:1512
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1396 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
              2⤵
                PID:4524
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:1
                2⤵
                  PID:1292
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3324 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:1
                  2⤵
                    PID:4336
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:1
                    2⤵
                      PID:4092
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
                      2⤵
                        PID:4672
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
                        2⤵
                          PID:4380
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
                          2⤵
                            PID:5156
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
                            2⤵
                              PID:5208
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:8
                              2⤵
                                PID:5244
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3776 --field-trial-handle=1832,i,10764405640705864018,373451046131759704,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5988
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:860

                              Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      5f52da1e4b09ad69ebd16a08cccf0038

                                      SHA1

                                      5432cfbb2cccd290415f96181e899ee4d712436b

                                      SHA256

                                      47206c46face5a6ca8249b310fa577af4fef5bd6584b2017d8b14395cd569a74

                                      SHA512

                                      a5662f93c91aa751a01a56b729e956777b503b7a0f402576abe5c37864154cb3671080d5f36c5daf51c2da0ec353e325dbb809fb3990dc8a298ff8a90f444aa2

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      2995496a9326dc5fe10ce649b3e3bdee

                                      SHA1

                                      573cebb916553965c4408f25f664717483b681be

                                      SHA256

                                      6884f8c9ebb1966079dbc49c0f987b76ed2e038e6e0656b88ce33364d42d4d4c

                                      SHA512

                                      cf09567ae33ea9f011c01567a32ead03eb34c9771052adc31613eb61189f5bccc1bd0f89a9228fa141cb1fe7e5616e83ab3285badc975fac85d7f44b9a96abfc

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      2b5f6e60850395242ee22066c662bbaa

                                      SHA1

                                      9add472da8f9b051124d36aa284fab286dcc4709

                                      SHA256

                                      fd1735822e5c0a71502345bd621462420ab15403d7991f7b53390055d96032ed

                                      SHA512

                                      30b42f228e743703c0f95c5ac5be799553ef09baa5092bb1b991eb814e1d11b80c7892da0ff2d93925b773d9f04d7df306ae84768a41e08cb68002ba0107d2c3

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      371B

                                      MD5

                                      cc278bd7f17e084d8a82ab48dd226b63

                                      SHA1

                                      77a62ca10015e234e2d9d73d1f35ba8c87301429

                                      SHA256

                                      0f71ea734df2c51b09cd7262b17a7ff3018958468e7eb72513e9c07a5ea227c1

                                      SHA512

                                      7e35a6365b303d34de485a53e33476e8492498a171f54244515f4108b7b2ca4628f040216d4e630975b3bf3e0f3cf39cd7ebe2ac0c4d110d1a81947786a8652c

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      fe13876fe70a061cf35e859f5c6d4b70

                                      SHA1

                                      866a6c7e62b0ea614452a4ae1db76bd5e167cc22

                                      SHA256

                                      550c787e8322493b61b93988d8c400dfab919184078607bd1180d9e87654b288

                                      SHA512

                                      aa7e2b46ce5e1ca911869f8f762172f1fced3132e9cd97d696d17ac5f7f6668f99c822a54c77e6b4382aaca28207b32593d20d4379064a5be1f7c3168ca31b63

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      5ec6536f31aea393f102f639d8c3f2e0

                                      SHA1

                                      1cef1034c2a21c7e102f49ce03bc0a55037c94ac

                                      SHA256

                                      d56a85f6966d63072d6a36e2b9d321724ab6f1f00ca3e4ed838a77fe78ecd814

                                      SHA512

                                      c5ed92ccca714f17f3dc9d20ca56dd29590c0afb25e4d209f2bee2b6dabaf2f0645d3eecff6c40b36d42c65a2edac23fa15575235e713a3f0d0159da41469924

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                      Filesize

                                      15KB

                                      MD5

                                      3d1728a16b180d46e36eeec8e7a8f021

                                      SHA1

                                      6fe15488a47209209f27f5ab8bc7d042c61d1866

                                      SHA256

                                      9809ff9c8f08f58fa76c769afec0d94d48ebaf7d14860fb5c4b649015023d035

                                      SHA512

                                      ea8c4fb227e8e2dfe49d685639318dc0386fdfbbb58d8c703bf3f456b0988d4acbed5c9589b1dd5c2fe20cf1807e01b178f84d5e8c1f660fe9540240e3080eb3

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      142KB

                                      MD5

                                      7febb52b2465b9d7b1617025a8bd0515

                                      SHA1

                                      8c6ed11adc03bca40da2881f44f9a90996275758

                                      SHA256

                                      da8a21146ff0a5dfe23d4853175b93ed310a1277d7624d03ebbbdfd66fb40d7e

                                      SHA512

                                      9b278b3efb4520bcf8364ec9c6cae1bf45f49ced7d38bc71a9ce979743f781aaeaa633c9b23cefc8be2552216caadd7ff552fb45faa40949c3e29f09dc38bff0

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                      Filesize

                                      2B

                                      MD5

                                      99914b932bd37a50b983c5e7c90ae93b

                                      SHA1

                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                      SHA256

                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                      SHA512

                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                    • memory/3012-133-0x0000000002800000-0x0000000002896000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/3012-143-0x00000000028A0000-0x0000000002914000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3012-135-0x00000000028A0000-0x0000000002914000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3012-134-0x00000000028A0000-0x0000000002914000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/4332-140-0x0000000000190000-0x000000000019E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/4332-136-0x0000000000190000-0x000000000019E000-memory.dmp

                                      Filesize

                                      56KB