Analysis

  • max time kernel
    105s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-03-2023 00:45

General

  • Target

    16790137340850.png

  • Size

    32KB

  • MD5

    ee1c269626d76f7afbf3fc5950bd6088

  • SHA1

    96ff8ea3a152708ee15365de333a521395773593

  • SHA256

    c3d97019b34dd8b2a094f0f563de679ee72e56d2ab4b692c521b4bf1fca76b05

  • SHA512

    b5a4940e4c1f034dddcb76da29976ee859e54d1c269b925fd6790760b62b691e52d9c4224acf0641765fc574262b4a44065ae654973e87218c419c2b1ca1668b

  • SSDEEP

    768:rTyXbcUCTy4hz3NaknZXevxOhhE2MMuPEph3rs1Er3C:/+b6TlVd/nRevx2222EuEjC

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\16790137340850.png
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2016
  • C:\Windows\system32\notepad.exe
    "C:\Windows\system32\notepad.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:564
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6239758,0x7fef6239768,0x7fef6239778
      2⤵
        PID:1360
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:2
        2⤵
          PID:1396
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:8
          2⤵
            PID:1288
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:8
            2⤵
              PID:1612
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:1
              2⤵
                PID:1800
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:1
                2⤵
                  PID:1976
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3468 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:2
                  2⤵
                    PID:2200
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1372 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:1
                    2⤵
                      PID:2288
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3804 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:8
                      2⤵
                        PID:2360
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3920 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:8
                        2⤵
                          PID:2368
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3804 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:1
                          2⤵
                            PID:2552
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3792 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:1
                            2⤵
                              PID:2612
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3680 --field-trial-handle=1312,i,4333025606401233199,3897219804705717134,131072 /prefetch:1
                              2⤵
                                PID:3044
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:1200

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Discovery

                              System Information Discovery

                              2
                              T1082

                              Query Registry

                              1
                              T1012

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                Filesize

                                61KB

                                MD5

                                e71c8443ae0bc2e282c73faead0a6dd3

                                SHA1

                                0c110c1b01e68edfacaeae64781a37b1995fa94b

                                SHA256

                                95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

                                SHA512

                                b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                Filesize

                                342B

                                MD5

                                8fe4837ed3a140340b1e56d422103246

                                SHA1

                                033d086e45bf4522f23258b0ca233d00cbd94407

                                SHA256

                                eb434b0fda35c97a3a584d00435817506b86569360cb9138df1974ef17a51d95

                                SHA512

                                8a555cbba1befceb2a0b392e32b0d5d4937cd24defbfb64da76b60f3bf4b8670466a0442f5e4e96718b22d966899399ade0cd63188d9ddb5494b653b74a2de0d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                Filesize

                                1017B

                                MD5

                                daf88327bf2df45317fd06f1214f3c44

                                SHA1

                                97ecd43fc9318aa1a3a1a3afbf5d5000796588fc

                                SHA256

                                9252a6b829787677a3b17c204f4f7118191f04b7052469b2390d560efde83aa5

                                SHA512

                                37bd7560fe2bedeabe09588e85e07fbf74c969229ccd803d808a3ad684b8284c9be4ca550f2254b080de93cf9fe15da01b9edbcb8a90142c033ea62a4ea7f6e3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                Filesize

                                363B

                                MD5

                                fdd7d2548ca42299d1c750ad080ace73

                                SHA1

                                bca41beabac80eec0d600843efb58c060373e968

                                SHA256

                                3ee17a5bbec9cac20ac10fb3a29ed718120ac3f5018697be4784f33db0b7a96a

                                SHA512

                                3afc163773f42fc783b283937b41c033fd4e41a3ae9c4858c591894685c55c5a5bdd61ba37190ddf592e0c69a45fd796806993dc0fcd2d6473eff1590cf49807

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                Filesize

                                4KB

                                MD5

                                a1f33082a5e83e35c814b12d149ebaaa

                                SHA1

                                9497db862eda8b7bb3c4728dea603058883aadb4

                                SHA256

                                d57900d185aa7b19cf4698490552ac47c399af87a490b40d3410aa38374d2c92

                                SHA512

                                ed4e1836f64477730eb49743ec8734844ab15d6ef6ee51f738eecca85da13861131d0889599db3868b3271421b16386b7d3fad2fc7304580518a79c2c90036df

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                Filesize

                                4KB

                                MD5

                                61a3ac1d873d68712e509e381e76d4e6

                                SHA1

                                d7772e3a8d7e5db9186de205baab80cc93707e78

                                SHA256

                                5dacdccb380a0b29e77081d3a7eb3cd11d92a1f12cb7c9659eec580bdfe9e430

                                SHA512

                                7f7ecf263d24bf7043b2abb3534854da0c8d42febf1b9e5ae716ef2970892d50f9ec5739b4f858558910e87438dd5c1563a03524942103c907f5275cbc6d2c01

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.dbtmp
                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Temp\CabBC60.tmp
                                Filesize

                                61KB

                                MD5

                                fc4666cbca561e864e7fdf883a9e6661

                                SHA1

                                2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                SHA256

                                10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                SHA512

                                c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                              • C:\Users\Admin\AppData\Local\Temp\TarBDBE.tmp
                                Filesize

                                161KB

                                MD5

                                be2bec6e8c5653136d3e72fe53c98aa3

                                SHA1

                                a8182d6db17c14671c3d5766c72e58d87c0810de

                                SHA256

                                1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

                                SHA512

                                0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

                              • \??\pipe\crashpad_1756_BDJLVVSLLHWSRJGF
                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/2016-54-0x0000000000320000-0x0000000000321000-memory.dmp
                                Filesize

                                4KB

                              • memory/2016-55-0x0000000000320000-0x0000000000321000-memory.dmp
                                Filesize

                                4KB