Analysis

  • max time kernel
    331s
  • max time network
    325s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-03-2023 06:30

General

  • Target

    2db7a6e5b5a6edf4e7a5d3a339536b08.zip

  • Size

    98KB

  • MD5

    a47611a826df8432d62f869dd05c843f

  • SHA1

    8e188a8d623af3873df578c12ab24d10e0fa8da5

  • SHA256

    dd5ecd3b7c805c6beb246d97912fbaf5f90fcfd733a4d6ac92061bba21ada1fd

  • SHA512

    260c27483971f7467a5ad12d21b5e6408abf152d3f002558a6bda2c6a3b2832bbf9d3ab2da6909bee8572cc812064c829f88594db3f2738a53d150ae3882c9f7

  • SSDEEP

    1536:/Mjl9ZvGIExTBFqfNhuiPDjG1A50x2euvydNaEvDxwa9C50YnlHZ7RDYL:OlzENB1SL0Zu6d17ea9eJnl57tQ

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\2db7a6e5b5a6edf4e7a5d3a339536b08.zip
    1⤵
      PID:3212
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4196
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\2db7a6e5b5a6edf4e7a5d3a339536b08\" -spe -an -ai#7zMap18857:144:7zEvent1701
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1012
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2db7a6e5b5a6edf4e7a5d3a339536b08\2db7a6e5b5a6edf4e7a5d3a339536b08.html
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3908
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff96b1d9758,0x7ff96b1d9768,0x7ff96b1d9778
          2⤵
            PID:3136
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1392 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:2
            2⤵
              PID:4812
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:8
              2⤵
                PID:3120
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:8
                2⤵
                  PID:3648
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:1
                  2⤵
                    PID:4476
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:1
                    2⤵
                      PID:4484
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:8
                      2⤵
                        PID:3400
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:8
                        2⤵
                          PID:516
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:8
                          2⤵
                            PID:704
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:8
                            2⤵
                              PID:1220
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2260 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:1
                              2⤵
                                PID:196
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1776,i,18173111599193294915,2435376598340998306,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4028
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:5064

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                96B

                                MD5

                                ef39c50700916abb6e64cbacf08aa651

                                SHA1

                                b070024fd392f0436eec6069002445c2d8780a09

                                SHA256

                                e4b68dd7fa20b82b52238e158ae6f897d67f6ec7a800a9fb5b2afaf93a79a529

                                SHA512

                                dfd2521edef2bdd9282857b80193f609699e751843219a23e7bad3dbed141b2793c6ab7e7a4f4763362d767926895f51448f6bc28cd8c445d96fc4116b06cabb

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                0deed580ab133c7a96f2ac50a6dca761

                                SHA1

                                9b98c92f408ab7e8a138db3ad321ca96c874282c

                                SHA256

                                1cbf493bb377247c377ca4374fbc8f4fe1ae470d733b5636afc71d6bb230c189

                                SHA512

                                34e5e7fd03e478d0378806941f655bf62278be68b6497aff4fe2541d04b21ffe71599ba5e343304445fbd4336be2198573c0655c802d22f94f61451acddc65e2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                538B

                                MD5

                                29191b7f543ba97aa1893e6d3a5ae9e1

                                SHA1

                                dfb910c63aad09ca3fc499347d4e3e9aae309769

                                SHA256

                                19161e709b4ab2138155416d2d8e2efeddf95ee45b4001656a5d3bd9d3bb2da7

                                SHA512

                                242b45207011513ff09fe808cb57e0e8446d09b89383a8c47383cfc3935b93d3b0cda4ddb4b50d7ea57bdc8e8f9a4dcbf169b9b8b77bb2fa25a66910aa18f874

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                15458159f35e4f32d3904b6af38faa4d

                                SHA1

                                1c5c777972345239b80181aebc34d04ef03bbc0d

                                SHA256

                                59777b9f368c2e2d52000bb0ce97e127ed9ca8adfb8bf2f442d43ce063b920e9

                                SHA512

                                a2b293f5e840fb8366cec50f8dde333b5ca054fc986fc52301ad0f0a7391cfcf8fca4bcd75fb9d1a55cb8346747681bdd9eb64d5e7e9647038cdee27bffd52e8

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                0974e87f9a5f9f4032c859a081363f5d

                                SHA1

                                b12ed2bf392ac697429e1cd46f78154bc212287e

                                SHA256

                                8b4d4075a7da7407d0dcdb030ba2039fdc0fb7d3ffb406b75b01a866479f3313

                                SHA512

                                e2afc08c352adb780497e99214978dd5baae62111491d865dd3323f78cb73182804fcd0da22705186176b3748fd8498d0825b36d82b5ec85c74582603a4c87d7

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a656141c-37b8-4e3e-bd44-bc156080b43e.tmp

                                Filesize

                                5KB

                                MD5

                                bc71a6b3961f1ca11038110f11afa37d

                                SHA1

                                34c4a20cd9fe3caa0199213220dacf834fd1f801

                                SHA256

                                194af9ae51bc134b980c7957c6a3b8976b69de8d06d061e9cd307d468fc51c4e

                                SHA512

                                2865830b4c26cb055ba38329c87462d6ae25c063ac73a51240d3b11090e789581bf575f914db07efcdb4a3d2d89da19ca829d17e50e467234e8e7b2dc3b0c101

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                146KB

                                MD5

                                71c926002a2864440a542353a6c6110e

                                SHA1

                                af80fcd8bf97a13b00f5a5b4c00a408679ac7cf5

                                SHA256

                                e72a584ac9aedfe26d4625e7fc68e6892ac6d6b22a888c2ae0b36c6fe59f7178

                                SHA512

                                0b356dbfcf07360b372701b6dfbd0ded32d2edf9f4456c6defd688f690d041bfc023849e47d8fcfde51f1735e8040a4d4c6547c9bb25ec5e2f387fee202d620f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                72KB

                                MD5

                                1e1b1ea330276a3266e15b9dadb7fe0c

                                SHA1

                                c20b55da65731265b7137a765cc774fcee94e453

                                SHA256

                                993dd39a638398d9725f12170a0371c163d37c21995615c61773a4b72b8e3111

                                SHA512

                                7ca6ef8a7db0603860223da240d0818558f33e19092d13a6c777cf6cdcf6d967ccddbcdfd3867403667ff6f481234280b2e4c3bd781fa25f236e3763974c8b4a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                147KB

                                MD5

                                287da81d5b7987c145256423a1c68e33

                                SHA1

                                e9efd25177ebd2c6333c7fab08b972517a2a17b0

                                SHA256

                                8326b510ecae78e41717c4ea3a401b775ce5c3596f9b68f50d4229391e7797d1

                                SHA512

                                a6c50c7645f49216ae49bab0bbb055420435cb283ca190a7ce40acb1c8068f0df50dc1ca4db2a8c89cb51e146b22efb552727c1e8489c875206b9ca79726b12b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                146KB

                                MD5

                                7554b2931e3d550490236ce94ebbcafd

                                SHA1

                                efb9617cb8dd77168e89482ff986ec813ee24619

                                SHA256

                                4b95fe804f57bf8bf5492e9acf03304e766598379741c7ec83e142606524d2f8

                                SHA512

                                2240a217d9ba146a669abdf899549a5d36c0b28af1ca31209f10010449a843e31e007ee11c35b23274948d5ddd6013e4407849ffd079b63a4bca9141ac440d95

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Users\Admin\AppData\Local\Temp\2db7a6e5b5a6edf4e7a5d3a339536b08\2db7a6e5b5a6edf4e7a5d3a339536b08.html

                                Filesize

                                329KB

                                MD5

                                2db7a6e5b5a6edf4e7a5d3a339536b08

                                SHA1

                                43ff41ba0a8b11b737bce4d8d546d9cc85074ce4

                                SHA256

                                52ff475ffcd7844c4eed3a6ba46af846e2c0dd5e204541973ed92a283ae9a26f

                                SHA512

                                990f9b11f8ebf8165b95bed48d47d146072a842e1c1a22bcdf24ddca807c6f562dc169c6f6819bfd14a1a48cea1f5305e192587ca4dea4933d614f6c7e92251c

                              • \??\pipe\crashpad_3908_JNYWUDEKNLBQQAPX

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e