Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-03-2023 13:29

General

  • Target

    http://gestionconseils360.com/0636220260950203145460035769768719450649239637937&84309098829807946717776588277467076532742468&info@motc.gov.qa.html

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://gestionconseils360.com/0636220260950203145460035769768719450649239637937&84309098829807946717776588277467076532742468&info@motc.gov.qa.html
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc89b09758,0x7ffc89b09768,0x7ffc89b09778
      2⤵
        PID:4056
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:8
        2⤵
          PID:3460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:8
          2⤵
            PID:3636
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:2
            2⤵
              PID:4404
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2724 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:1
              2⤵
                PID:2816
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2740 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:1
                2⤵
                  PID:4436
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:8
                  2⤵
                    PID:4204
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:8
                    2⤵
                      PID:4856
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:8
                      2⤵
                        PID:4280
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:8
                        2⤵
                          PID:1800
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=164 --field-trial-handle=1804,i,9203791624392530270,10848041616245094305,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1676
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:4844

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Discovery

                        Query Registry

                        1
                        T1012

                        System Information Discovery

                        1
                        T1082

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                          Filesize

                          168B

                          MD5

                          23c614998921e2b0fff12b1e81acc775

                          SHA1

                          967f9ad7d07a2b0571a23036156b81623bcce1b5

                          SHA256

                          ac8fb5508b819e802eb1f2037530c0aecdf2ce914e554606e73231d74f3c24a4

                          SHA512

                          d9c6e97c3896266daeeab70656e4a7595551105098e4bf444678a030d8a220c88e5b5099dd911579d44aeb0728c7ed51bb888742cd7b8856a448861385f9724c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                          Filesize

                          848B

                          MD5

                          853540407901b07ab642601d13f96798

                          SHA1

                          f419f7ae48aa2110a2016ae7669c99fe7f40111e

                          SHA256

                          7e8ed74f4deaafa9d0f2362a213a9521ce2d3a98e7f036af7be8e125eddf2d09

                          SHA512

                          e3f2d08cf88294168fbf7dee0c3f213e5d92a4c19716da5c18829ef281bf478a73e5b015704191373ddb0c09a815655d03c6cb94a1ae10b77344130e807af8e0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          5KB

                          MD5

                          4b74e13884c780e76f337851576ad479

                          SHA1

                          db0edbbc83c7f4e4a5d63db3bff356fa6d13e20f

                          SHA256

                          0b870651d3a570490a9add39cd66e3d55d9f686b78c3997676f92e12a1e9b2c4

                          SHA512

                          55353a91584c303909098fad79b6083af9d8ca31d3e8af6b43134dc4411c9dcde870379ffecdafd1c7b943e5146fbe4229d308fafb3cde5cabbd7cfbbff6d624

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          6KB

                          MD5

                          c27e928d10576c18414f1e9f89455608

                          SHA1

                          b9ebaa0549f556f9e10b2f4b59825c2f8c02dffb

                          SHA256

                          dcf8667972bdbb80a24afc290010d1635935f855a43ab7957913e5851632320f

                          SHA512

                          2560b56eb1a209ca2b6368b64113cd34a6ea96adc41f359528199e30782abd314f0be52c2c69166c44c2eed50b934a915de01f3fb83965c9b65025158e56288e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          5KB

                          MD5

                          250f3c302975e3cc88340df90912306d

                          SHA1

                          181ac5808ef7382d46ee28eb937e1f0e1ba95936

                          SHA256

                          27626bcb3e31befbabc5b3186e258d88652072b1881e741c76877277f7f68a99

                          SHA512

                          5a34c7242aace6304a5b012524d31298d8d570b3df784d75c2cbc40f0ef5dbda2115ccb784b847261e317bb69f7148b77edd033a74a9dbc9e561536f3e99aaf4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          146KB

                          MD5

                          438a239a48dbc7e43c8e7c03b52876ce

                          SHA1

                          57cd2a37af07366349ab5acd16baa63478c3ce8c

                          SHA256

                          93b5872fff4818ca154157eaff4f1c78eec2ae1efdd9355c3452e5d6cbe93509

                          SHA512

                          a36ea4615caed298af988dd11b5358d4e6aabcd432bcbee08ebb1d961d77056407b89ba37e1e6d41d62351ac8269612489472e6c5afda8dc758a3a360e5053c0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          146KB

                          MD5

                          dc39c42e76cbb6dc4af05fc41a869ce5

                          SHA1

                          6dd1c3508381b5f1bcb895a9abc9aed752345516

                          SHA256

                          54baee9abbc4cff85d29c4496be0de41a3f72e60426de7caf2aced8f2d464221

                          SHA512

                          3c569643fc18b1c3f5eaa8432b1e8ced468a432f486fefec386bbe997eb589ece41e891ac3ee7bce2e64016e52f8deb6c9515dd8cbec339c9a71aa435aa4b0d8

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          146KB

                          MD5

                          dcb99ea12443cac6be5c8650ef1e3f75

                          SHA1

                          218cbb083c4d221dc51fd17f98e37eba09312385

                          SHA256

                          af141dd362cf1a20bc727c03b61c60e720844107a12c3ed9efe9257ad688ba2d

                          SHA512

                          b378d4ea822da66c48fa797c383a3f6509056b132b5db29d2d9c22e1d44026fa4ba4d94c8342ee370e5cccf60824c8a7fffbee5eeb32075cb540ed420dd10539

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          72KB

                          MD5

                          721917c4c8389b22eee0f0ef1fd78464

                          SHA1

                          7dac2e1b674c300f973f1a1d8c0d2c42266cb40b

                          SHA256

                          2a50bc8eb919d4e529462a819ff8fc996fd1f4d0eb74f87ddadbf67fe7316ad8

                          SHA512

                          756a316f1f1d0efc50ead2966399370608c729aa54fa2e3865214b709ce137fc6618c7b44cb09ead59af80065f4c549d5d0ba4aef75f8d44d0c363c7b41f29f1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                        • \??\pipe\crashpad_4192_QXQHUGSOEFORDRNR
                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e