Analysis

  • max time kernel
    1800s
  • max time network
    1738s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-03-2023 16:36

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Worm/Fagot.a.exe

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 16 IoCs
  • Modifies security service 2 TTPs 14 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 27 IoCs
  • Registers new Print Monitor 2 TTPs 10 IoCs
  • Sets file execution options in registry 2 TTPs 59 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 54 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 25 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Worm/Fagot.a.exe
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcf7759758,0x7ffcf7759768,0x7ffcf7759778
      2⤵
        PID:4080
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
        2⤵
          PID:2488
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:2
          2⤵
            PID:2168
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
            2⤵
              PID:1564
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:1
              2⤵
                PID:2952
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:1
                2⤵
                  PID:3568
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                  2⤵
                    PID:4996
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                    2⤵
                      PID:4964
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5168 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                      2⤵
                        PID:4828
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4620 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                        2⤵
                          PID:2588
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                          2⤵
                            PID:768
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4832 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                            2⤵
                              PID:1824
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5292 --field-trial-handle=1808,i,4285644538963407091,1516925353730605113,131072 /prefetch:8
                              2⤵
                                PID:1724
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:3660
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:1680
                                • C:\Users\Admin\Downloads\Fagot.a.exe
                                  "C:\Users\Admin\Downloads\Fagot.a.exe"
                                  1⤵
                                  • Modifies WinLogon for persistence
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Executes dropped EXE
                                  • Modifies system executable filetype association
                                  • Adds Run key to start application
                                  • Modifies WinLogon
                                  • Drops file in System32 directory
                                  • Drops file in Windows directory
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Modifies Internet Explorer start page
                                  • Modifies registry class
                                  • Modifies system certificate store
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4456

                                Network

                                MITRE ATT&CK Matrix ATT&CK v6

                                Persistence

                                Registry Run Keys / Startup Folder

                                5
                                T1060

                                Winlogon Helper DLL

                                2
                                T1004

                                Modify Existing Service

                                3
                                T1031

                                Change Default File Association

                                1
                                T1042

                                Browser Extensions

                                1
                                T1176

                                Defense Evasion

                                Modify Registry

                                15
                                T1112

                                Disabling Security Tools

                                1
                                T1089

                                Install Root Certificate

                                1
                                T1130

                                Discovery

                                Query Registry

                                4
                                T1012

                                Peripheral Device Discovery

                                2
                                T1120

                                System Information Discovery

                                4
                                T1082

                                Command and Control

                                Web Service

                                1
                                T1102

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                  Filesize

                                  1KB

                                  MD5

                                  2065b32b1a71d1883d68300d32de1496

                                  SHA1

                                  6768b19730974f27340453a4c075d7fc3b243597

                                  SHA256

                                  4cd695621f62ac916a09e8d8ada5aadf7ad88589da866f65b8c5bcd0cf98da24

                                  SHA512

                                  2b7951e252697934d9223642c09d47c25e7eb50402f5cc8cd914e95eb793bfad910a325b61030f3d2103c626e608e0bbab214c2c58327f419dfe2ad613312be1

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1
                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                  Filesize

                                  1KB

                                  MD5

                                  3f1de8b85238da5694c715c336d8f558

                                  SHA1

                                  4efe85507292c1b80190b704e7fdf2cbb36fde3a

                                  SHA256

                                  4207ee253165e1c20a5d2273545ba223787b02bdf55a0152465c219442f09947

                                  SHA512

                                  51a83233bcff432ac14eacd3295421db1b8faa417928060aaeb87bfeb6b1d166698462166685d904e3d7530aa942202186a2510b73775b8999606c40a9b3568d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                  Filesize

                                  1KB

                                  MD5

                                  5980da5a12c13747035909b109eece35

                                  SHA1

                                  9fbce96c59166fed6d53b025ae53b0e0cdfc4532

                                  SHA256

                                  42fa6acc45deb7059218a7f1bf7b4a68a92a8d292b45bd1c2223834e9471de8b

                                  SHA512

                                  877c14cfbc2181bdd600e2743eafb2da8652a0803e9309864c1eda65a79c0322bdb5f66759daf02e208471a7763958a38c80c131d1e48fea92740460b991e2c2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  6KB

                                  MD5

                                  8926db3332c39360f69b9e0cc174e05a

                                  SHA1

                                  ad413bd97657a3af683fc960743254702b44a7e4

                                  SHA256

                                  9f8cf63408010623ff00ab708ef4a876762373193d22151c96bb5a0310426f71

                                  SHA512

                                  3e7d00c17c83a6c7661b06c8a5b70282f4bfda06a9aeccefcf949915dda2cb2e3676f261865878b8b5d27ed975efa98b77e5479590e20b0951c226b0599ab39e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  5KB

                                  MD5

                                  918d3675abf2470e01bf6fc3e613fe8a

                                  SHA1

                                  b04d9e9be9f3b4c8107583e73615ed3e9d3e4042

                                  SHA256

                                  a8d06bfcd0ff4436227d9e2afe3976891bc0ebc2a41cf32a64276fe4eb85d650

                                  SHA512

                                  a9b4f3e12c826a6bc765a74a21c7faa34f9e952e38269510ea47624fe47d91f76f8fe247034dba954e8eb0903bc4a2446b74736fa100d22fafd327a351f8021d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                  Filesize

                                  146KB

                                  MD5

                                  3588363a76741ba42a51ce2684169614

                                  SHA1

                                  f4d857ae10f1aa68cffa8d9c4ff8621852bee777

                                  SHA256

                                  e7db383cb6971037fa14ab5fa63bf4814ed7bf4a1ded0b1111c34a5c0c4dcdaa

                                  SHA512

                                  51f65c7936bd6cc1a2d3af45dea15875b914c6325bae037dcc67036d7b7c3b3903152166fe4ded422243cd627a5167fa5fa2553881c1a6f5539dbbdb573c165b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                  Filesize

                                  146KB

                                  MD5

                                  f9893f3de027f7fef3a7eb95f6e1f642

                                  SHA1

                                  a505d584d5fa7f2d02c17ee16db1828de4fab562

                                  SHA256

                                  7e5cc061f2dc5e1a678909e0adbb6b7d818d576a29314a615781f76fcc4fe087

                                  SHA512

                                  809f991495015951ad7597b3d1eec8ce451c01b6b9a44cc3c7dd6b0af4eaf372460964ef2cfddb57d30e0d8c3ed81b6f9625d4e5909aed5bf25eb1c31f3c5e66

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                  Filesize

                                  72KB

                                  MD5

                                  bb144eb4d3ba208fc9b7a514ad8bb519

                                  SHA1

                                  576edc635c0e74741e5559add07c820a0372952f

                                  SHA256

                                  68d10860b7611826fdea8bbc6c4aff003301ae4cb1ebb1d06e1ebcf4e8448586

                                  SHA512

                                  104f46e54a251f047fcfa1e70a4d7e6a1c1ede2e12a96880bae9af5f80476a494e1993303a4bfaf200cc0bb830340ad89c2109407c76b8e0049b1faad02bfa13

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • C:\Users\Admin\Downloads\Fagot.a.exe
                                  Filesize

                                  373KB

                                  MD5

                                  30cdab5cf1d607ee7b34f44ab38e9190

                                  SHA1

                                  d4823f90d14eba0801653e8c970f47d54f655d36

                                  SHA256

                                  1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                  SHA512

                                  b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                • C:\Users\Admin\Downloads\Fagot.a.exe
                                  Filesize

                                  373KB

                                  MD5

                                  30cdab5cf1d607ee7b34f44ab38e9190

                                  SHA1

                                  d4823f90d14eba0801653e8c970f47d54f655d36

                                  SHA256

                                  1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                  SHA512

                                  b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                • C:\Users\Admin\Downloads\Fagot.a.exe
                                  Filesize

                                  373KB

                                  MD5

                                  30cdab5cf1d607ee7b34f44ab38e9190

                                  SHA1

                                  d4823f90d14eba0801653e8c970f47d54f655d36

                                  SHA256

                                  1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                  SHA512

                                  b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                • \??\pipe\crashpad_4300_MQAJOQMPRSKMZPIJ
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/4456-344-0x00000000006C0000-0x00000000006C1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/4456-361-0x0000000000400000-0x0000000000463000-memory.dmp
                                  Filesize

                                  396KB

                                • memory/4456-362-0x0000000000400000-0x0000000000463000-memory.dmp
                                  Filesize

                                  396KB

                                • memory/4456-364-0x0000000000400000-0x0000000000463000-memory.dmp
                                  Filesize

                                  396KB