Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2023, 10:32

General

  • Target

    https://t.rdsv1.net/ls/click?upn=-2F5lYtJIFTedMaz3r5rsER-2FF5TKtiLW2WuTLNORySssCLyn9KzZdOUNkxNt4jVeWbR2dGEf3QuvnILoYPEQ9UFcjVaiuZbZ8ii-2Fwux1hb5BdaLkR-2FM4o-2BEuYrSpZQ547oEqOdvX2mipRHo0JgvjJr0fIDx3hxpCEnA2s7C-2FXLaKmcPNES4kUGIIAU6kBtbrPAKrk2wmnnF2SetDX08onZVP5iCa0CFWpD4CW0KpBaMDsiajmSu08XSLwORUnD4FNtyeG-2BnESMKFAKUyiY-2FQRo4FjIQ23LWzcRHuwKhPjprWM-3DX3q7_kPst16VWwhWh5ewPZLuhw7RAS28NFhbcCFvyO1C2WBOmQSEF5RCcfPhMluTxzPejzwoLGUawJTzuX1FXOF1yItUu38x985WbBIVZ1sbuaL-2FC-2FE7poKEKWk-2FwIiND2awcnjollKk3JHnHB9KuuRRixoH7rcXxSlIooLkhwhZUlCNuEBr-

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://t.rdsv1.net/ls/click?upn=-2F5lYtJIFTedMaz3r5rsER-2FF5TKtiLW2WuTLNORySssCLyn9KzZdOUNkxNt4jVeWbR2dGEf3QuvnILoYPEQ9UFcjVaiuZbZ8ii-2Fwux1hb5BdaLkR-2FM4o-2BEuYrSpZQ547oEqOdvX2mipRHo0JgvjJr0fIDx3hxpCEnA2s7C-2FXLaKmcPNES4kUGIIAU6kBtbrPAKrk2wmnnF2SetDX08onZVP5iCa0CFWpD4CW0KpBaMDsiajmSu08XSLwORUnD4FNtyeG-2BnESMKFAKUyiY-2FQRo4FjIQ23LWzcRHuwKhPjprWM-3DX3q7_kPst16VWwhWh5ewPZLuhw7RAS28NFhbcCFvyO1C2WBOmQSEF5RCcfPhMluTxzPejzwoLGUawJTzuX1FXOF1yItUu38x985WbBIVZ1sbuaL-2FC-2FE7poKEKWk-2FwIiND2awcnjollKk3JHnHB9KuuRRixoH7rcXxSlIooLkhwhZUlCNuEBr-
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff865929758,0x7ff865929768,0x7ff865929778
      2⤵
        PID:1228
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:2
        2⤵
          PID:116
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:8
          2⤵
            PID:3780
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1308 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:8
            2⤵
              PID:3992
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:1
              2⤵
                PID:2204
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3368 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:1
                2⤵
                  PID:2640
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:8
                  2⤵
                    PID:3608
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5136 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:8
                    2⤵
                      PID:3664
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:8
                      2⤵
                        PID:2484
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 --field-trial-handle=1812,i,18189975481898727446,639772271249332068,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2436
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:4996

                      Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\8db643f7-72b8-4092-8648-7bdf2e5a4b96.tmp

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              3de3e1b32be5f724b8ea292f1681f09a

                              SHA1

                              bb7518c0c484e96104df464736c88e21abcaf193

                              SHA256

                              568b59876c1837c36b47e27a5f2078b50e1e7376ed1c0e970a764c38d2f701bc

                              SHA512

                              56c06e30d9a9e96051f652ec651309fc83005897e035d557d372d2c14f5b93d53e71150c514bfe725f055148777c8ef77f3dfaf065304cc001f03b9fb4bd215c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              5a2ef6cad5184f33589012c21a463445

                              SHA1

                              e17385309edec9b999cdf837f0be851000f3649d

                              SHA256

                              5a9111e388163a78d76f5abeff0158ae015bb34be731bcb1619361869a9e4c2d

                              SHA512

                              15ddbb020be34e594052d42525c2afb1bbb238d2ccbe2ea2489a72282184b58d19dbb8dcd17967efac959d97aad33d4a72cef8693173719846c36095b5c89a96

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              6b31c5a255c588e3f23ea0d3125330ca

                              SHA1

                              82fc2455631fb003eecc1bee2f5e2c76509228a6

                              SHA256

                              12bf704b00b8d7ad8400d37cc72a9df631c693be955b484ac5b919eaaa8b0aba

                              SHA512

                              3f11dece7494a6e15c903580c1ff7d38f13f32cbb031e85869692685674e8d1620cf987f81251ac503e83d093706c3c11a7ecf731fb29a524327f3f683a8a161

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              ba194d83d92c2c30d43d5c52f5cf31c1

                              SHA1

                              c7f091fb68ff98d3b69bc227c1fe64a0d51c5b7b

                              SHA256

                              884816ede3edbbac819cb16ad8fec01afedf2a01772549fa0fdce91d334225e1

                              SHA512

                              d0840a23366a45d7acf66723d0fa816c75b9e52800d6467c2b7b839bb659681b9c8dbae70db53a60f98139745a9acb736cdf14f2751757b8331f84711deb6253

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              143KB

                              MD5

                              374487bd12427a07dffe95c41e7c5159

                              SHA1

                              e93b0d385cdbbf9756b924adc58c42b27433d8ba

                              SHA256

                              9f98d665dbff750f18c80868aa322fed3e6550f6be290b67045e13861eb6d877

                              SHA512

                              e2cc59c4c374d6d17dee8506b4881d47dbb05ccd84df6b0c145afc5875add906fb429ff6a279c202d4351cf2ff1b32bdb5fcf2add0f4c4387415b994ae8547c0