Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 05:20

General

  • Target

    https://www.youtube.com/attribution_link?c=coachblog-ytm-acq-int-blog-txt-coach&u=http://cage.25.etfapars125.ir/google.android.apps.youtube.music/yodjwtfc%20#tj_base64_encode%20aHR0cDovLzNrNnhtNmh6Lmh5dW5kYWllYXN0ZXJuLmNvbS8=?em=bscotter@cpf.com.au%22

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.youtube.com/attribution_link?c=coachblog-ytm-acq-int-blog-txt-coach&u=http://cage.25.etfapars125.ir/google.android.apps.youtube.music/yodjwtfc%20#tj_base64_encode%20aHR0cDovLzNrNnhtNmh6Lmh5dW5kYWllYXN0ZXJuLmNvbS8=?em=bscotter@cpf.com.au%22
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab6279758,0x7ffab6279768,0x7ffab6279778
      2⤵
        PID:4264
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:2
        2⤵
          PID:4500
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:8
          2⤵
            PID:4284
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:8
            2⤵
              PID:4580
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
              2⤵
                PID:4484
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
                2⤵
                  PID:3892
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
                  2⤵
                    PID:4632
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4680 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
                    2⤵
                      PID:2320
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3420 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
                      2⤵
                        PID:2764
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3796 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
                        2⤵
                          PID:3368
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3800 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:1
                          2⤵
                            PID:3376
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5408 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:8
                            2⤵
                              PID:4768
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:8
                              2⤵
                                PID:5108
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:8
                                2⤵
                                  PID:4388
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3664 --field-trial-handle=1828,i,5476221331616527981,4063752952055810284,131072 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2152
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:2572

                                Network

                                MITRE ATT&CK Matrix ATT&CK v6

                                Discovery

                                Query Registry

                                1
                                T1012

                                System Information Discovery

                                1
                                T1082

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007
                                  Filesize

                                  19KB

                                  MD5

                                  e7ca24dc3a47160c9af0d45e48f1f911

                                  SHA1

                                  c689e79b895a18c9f1334d6eff56744ae22739b6

                                  SHA256

                                  abb85c399c274734c689156024267ece39c2b96d82c752065c9a649a8abb4c42

                                  SHA512

                                  1b6c6e386b8ae1202e7699b2a56c7573ef44661c7c4977b0a9e261c576066ec3c536ea94c7a4cbb5d70ebef2405ad71aa1e3a10c2a9340c69831db53e2fccabd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000009
                                  Filesize

                                  43KB

                                  MD5

                                  ba923b68f3b3b1d5d278bf95bfca39c3

                                  SHA1

                                  c603387d21972de4efc759ce791c17772675eb75

                                  SHA256

                                  87c1a50807ed5c994c8d54f6b096f9dded633102e097eb3c5793dffb38fd257e

                                  SHA512

                                  8b12bbbb8c3a791ce12df2f1d9645b3606b32b398464bd38398f2ba042f3e21e734baa96da6e7147616781f25c1d85216e650ace28a892654f89383f3645823c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000a
                                  Filesize

                                  17KB

                                  MD5

                                  7916a894ebde7d29c2cc29b267f1299f

                                  SHA1

                                  78345ca08f9e2c3c2cc9b318950791b349211296

                                  SHA256

                                  d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3

                                  SHA512

                                  2180abe47fbf76e2e0608ab3a4659c1b7ab027004298d81960dc575cc2e912ecca8c131c6413ebbf46d2aaa90e392eb00e37aed7a79cdc0ac71ba78d828a84c7

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000d
                                  Filesize

                                  39KB

                                  MD5

                                  1d65bddae4eaeefc77cb9cfecc565b5d

                                  SHA1

                                  a7d87150da1df6ae6db87d98760db7d753dbf6b9

                                  SHA256

                                  b98d5ba052230db0abc1b0e7b09d814114f6b7c316836beb88e7b49057dafec0

                                  SHA512

                                  f2cf9d120d7e18ae3fd77cd85176401a3eb7db4af10e16d58c21d86f738fc74525a21e3a319197435e43e50e61dfa8cb2f7207962105360e7be5652a28165944

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                  Filesize

                                  72B

                                  MD5

                                  efcdd69a5cdccb4660860a6138dd8e31

                                  SHA1

                                  68037a0304b8e2729c60046281c6420d4b8305be

                                  SHA256

                                  cc7766b85d9319132b376698dd1ac4829edbc985c69c939e2046f6711199c051

                                  SHA512

                                  7e2f014988c8eb7de9bd87eeb1f940afffb392ff5a168ba0afb43c3946c279b3b1681046ff44c598f627c9b5133fadc2781f667d00cbc02e67925f7ef4307b13

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                  Filesize

                                  1KB

                                  MD5

                                  80d4ecf5fd432b3d89031347f6056f2b

                                  SHA1

                                  4bf68c829ad38da5411241a8eeff120679fba96b

                                  SHA256

                                  c1c417c7759f7a7d5d50f4e9b08fabb3e7a1e8728f4561230fdaeb0155d59427

                                  SHA512

                                  b5b1805282ea75817a1da4236ec6d4bd9a803a25b0d23f4b2b20b0c198449d8e2b6999c752846075ce12697b70ac106fe23f2f561c3a287649b6e75c16cf9efa

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                  Filesize

                                  873B

                                  MD5

                                  93de1ce0c80e16736c0a07b41ba6ed03

                                  SHA1

                                  09071361384c5bb625b5a3ab627a08b4645ac5b8

                                  SHA256

                                  e2d422a4ac761dc4bb2499ca3f6cd21c44bbfc18b6becc72d9eb62933b986d6c

                                  SHA512

                                  982567fe146d726d9f00e3681c3a734d6091c60496617f04175f90ac337b2ac1bfa45573b81a32afc527510206f8a90eeb9bc3eae02d2396d0b7a55d49abcd78

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  7KB

                                  MD5

                                  ec630f953351cfbfbaecefed9d02a816

                                  SHA1

                                  45cb0d7154be8f8cf4a131b92b86e98a6f863560

                                  SHA256

                                  58e7b2f79ed0eb703e81122df37b364bc1c4091f669118958c122b874da295fe

                                  SHA512

                                  865dfb58a8356c8424f4377d50ffb6ab4736f014f8b9b07d74d958b75477868ef4f24fa5dab31f98f57351c398edba25c43f4af3ada6f10086efe4157d7b5c9d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                  Filesize

                                  15KB

                                  MD5

                                  2e8bb6ca2af10c2772e92f4699dee0ca

                                  SHA1

                                  f5693addf0894590f83c2e5a11f708bdb7521675

                                  SHA256

                                  eacfb31678a68d79b0ac2b048d873df2fb8e8bb13f83d8c98cc18e1038857816

                                  SHA512

                                  4a5a0af2d2a193f43813cc31c0cab8c2a353beff266b5f3fef7d0ca3805c4fe6847d6ead32011d124717eaf1c5d676362efa4fbee0cce38c6960581b97a238e6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\bcdd0f66-3bb2-4c02-bb64-8e0fc9a82e03.tmp
                                  Filesize

                                  145KB

                                  MD5

                                  d107284dc7b081fbc0aa490447390d55

                                  SHA1

                                  4ec8636947042504e08c04c055eb109bfb5691b7

                                  SHA256

                                  a94bf549a6aa4052767f9afcd27d805d1f9bfa57cb3dab778ed51b912f71e7ea

                                  SHA512

                                  4d136b0085c20986ba11232c05109097e6678a3940174b2bc0fc6d16ab4a3aa0b0b5dfc8865494ae97577cc1ca1f46aef8cd1d5b837041ab75c3eaef713b7f23

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • \??\pipe\crashpad_4604_BCFGLVBYVSVMETPC
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e