Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 12:57

General

  • Target

    https://brandequity.economictimes.indiatimes.com/etl.php?url=https%3A%2F%2Fnancysupo.com%2FNew%2FAuth%2F/vtcos1%2F%2F%2F%[email protected]

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://brandequity.economictimes.indiatimes.com/etl.php?url=https%3A%2F%2Fnancysupo.com%2FNew%2FAuth%2F/vtcos1%2F%2F%2F%[email protected]
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d9529758,0x7ff9d9529768,0x7ff9d9529778
      2⤵
        PID:1468
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:2
        2⤵
          PID:2292
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:8
          2⤵
            PID:4980
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:8
            2⤵
              PID:4776
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:1
              2⤵
                PID:2396
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:1
                2⤵
                  PID:432
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:1
                  2⤵
                    PID:1652
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3864 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:1
                    2⤵
                      PID:4392
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:8
                      2⤵
                        PID:3952
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:8
                        2⤵
                          PID:208
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3364 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4640
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3476

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          216B

                          MD5

                          3b4e1ec3234bacd1f20cdc5df62e7126

                          SHA1

                          45d94f3608fc98ce3d9d70d7685881c892671f35

                          SHA256

                          c7795b288a76979f55ecaf64cb1b1d030ff538a355379d152d9a7f36b6ebc2b4

                          SHA512

                          673cf2abc8d7087649df8422d2ccbdd85b46bdc140371192308585c55a5084ade2752d1f9048ffb5662a56a41c37e07c18c4c217cda66440d4a5062fa2b99bec

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          e94278f86631ea8989c92275c11e4864

                          SHA1

                          46e627fb7198e8d5ebfb155b34fbbf8d88835ebe

                          SHA256

                          ea2a3412d6c8292a18ca2093b727fa375f5b302e9a914d389e431a41af5d6b68

                          SHA512

                          82abbf2972ffd379fb912d12c3514680f8d8f4423086e6d200d590347ef2a6b4788ceb8ce49345b0ab8b52ce5fd9527fbb988e0efcae14fc7bad953e41f56fc5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          1KB

                          MD5

                          e662923fbe66abf5f3fab8001e42262c

                          SHA1

                          ef97615a5c7499dbb052f5a2ea893b1a3a82f363

                          SHA256

                          b115a54c89fab551b73e059e92fdd07537e784003f218854a2fdd7f990bcccad

                          SHA512

                          080db9d829984c2b7b7a33608fd0c38255ab3e292fd24767e96a9ad92d74ee5db022c8d7aa538e7f6b795fa0247aa1000cfb3a3761a9a199023b2e59b82f08f7

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          aa17ea5d2dd881d02e3193ffd1a9a98e

                          SHA1

                          6591932db84577610da3d6f4502f8beac4f99e32

                          SHA256

                          5f8d2b7546a85a7dc6340ab030879fbfaefed54dfc59573d11541f6f8f99ac40

                          SHA512

                          22033f79a517f598aac194b1885c7466888814ba063f91c05b7fb07151476f50ec6393c348491db72201546de2dcfd8c035cd03f98047797349157ae45796b46

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          46732591daae56b09a5c5060d22508ed

                          SHA1

                          5fa402251f0e9bdf96b23526b263d32300369120

                          SHA256

                          37338d105279a0dbf8556b9eb01e346d61c6b728a10285c2e0a9188229c5963e

                          SHA512

                          abf8cfa5b368f96c8af96238a9e4fc41ece7fd1a7352742322c6edbbea7a841695721f2285f4823cc52aa4b0b4e336d97477a21fc58e94ce018e1c6f52a33497

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          18ef484e2cd4ffbb1e26c34d0cbc3efd

                          SHA1

                          a0f3bf3cb1e6a20f3eb8813d8843627e3228b273

                          SHA256

                          8a47b10bc0e940078175129d3d9fe7bef84904cdb251c8a3163b066e104769cd

                          SHA512

                          af60e7e0161ad29c3503488206cd3b2ee57a3aea9b68494c1dc4bdeecdb611318e9edec47ae280071b6a2ef582bf844d950eb1a094c26b066a373cda21f644c2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          144KB

                          MD5

                          88625f18321baa1e1e43de1fcee4272f

                          SHA1

                          ad17843981278bd72d49c569e65deaa2924fab3d

                          SHA256

                          f7fe5850e7ee78a493d5a9da6f5e94df933fd8be032815431e7b0298fb568a0f

                          SHA512

                          49822813f175b9a891b7e99c8cb0c8ddddc6583977739313e0b92e97e211685e46bf744c5817ece1f8a4407bd3e70b2edd0f72011367b3237cf6a937a54a0aa6

                        • \??\pipe\crashpad_1720_DBPBIYZQKMPZRIDZ

                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e