Analysis

  • max time kernel
    82s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 03:39

General

  • Target

    https://cdn.discordapp.com/attachments/1073912598946402336/1084365135273017434/ValyseOfficialRelease1.4.1-b.2.zip

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://cdn.discordapp.com/attachments/1073912598946402336/1084365135273017434/ValyseOfficialRelease1.4.1-b.2.zip
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0cd29758,0x7ffa0cd29768,0x7ffa0cd29778
      2⤵
        PID:4136
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:2
        2⤵
          PID:2100
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:8
          2⤵
            PID:4784
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:8
            2⤵
              PID:3484
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3212 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:1
              2⤵
                PID:4740
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:1
                2⤵
                  PID:1420
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:8
                  2⤵
                    PID:3884
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:8
                    2⤵
                      PID:1328
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:8
                      2⤵
                        PID:5092
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:2568
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:1220
                        • C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe
                          "C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2276
                        • C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe
                          "C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe"
                          1⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4328
                        • C:\Users\Admin\Downloads\ValyseOfficialRelease1.4.1-b.2\Valyse Launcher.exe
                          "C:\Users\Admin\Downloads\ValyseOfficialRelease1.4.1-b.2\Valyse Launcher.exe"
                          1⤵
                            PID:1516

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            823B

                            MD5

                            5b79a96316593be184e1f96a8fa4bbc8

                            SHA1

                            af6dff01ed96d7634bc7607f2872bf28e52ee6fd

                            SHA256

                            c84ec1189698bbbd284aee5994cf36d84b632ab2c9bcb84a0f55a78ed82a1931

                            SHA512

                            aa151fd8e234c92b0893dd46dd95d1798bd1f792385fdb43fbca548f4df83f01e9d1b1a682ebfe331b0adb9e229f3660034b8fb7e79ac23917f1ec83433017cc

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            291b756e487fc47269efb67f1572da60

                            SHA1

                            08248b2ff0c3df1e3768697598c2a40760f494cd

                            SHA256

                            f478d6eb880f3d04d42a6dab447b21c734a78ceae0864e6d33a3bee322a8547a

                            SHA512

                            6315801f0f682c42c5ca7fe6a12a35c99bda135db08c4f54196bd8747532f22274b6bd0c6e052e90b687e795954b931891fa4272446ca6a9c89bb9034599cd33

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            3f66b6f491e6c04efabf411457179c88

                            SHA1

                            7410d98ea3a8867535c25530fd0981185a4dc8df

                            SHA256

                            2ad0d3ccf22944778e3abcf156a9adfd3f3acc8783a27baf5d8dffcd119c0142

                            SHA512

                            751655cb6ddc42b9881254277c69cd50691a7d7be397ac9a8513458011bd03e569b8390d1a8d62573539943fe29f04a30fb8a6e235b54f2af2796c34afaca44e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            792fb371a86f5051de9fc533c196e160

                            SHA1

                            698cb9aaaadd75b2fb70dd2d9ea396f865e7158a

                            SHA256

                            c5f79734ec37a35ad6aaf57b2fec2084375c26a311c26a2272052e4859e43a20

                            SHA512

                            0214bcc5ba586f27b36d3a08821e12dc63f0f0897f1fcaca36defb232f291d8f95c0f6d8c6ca00bb8b22606defaf106439655c7848049d8d96fea9eff14f4140

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            173KB

                            MD5

                            41a0925cdb6633fa0715d72b83a087a7

                            SHA1

                            3004bcdb626527b63f58f3b09df10df1dd467f6d

                            SHA256

                            cd34477d5420aeea9f48b46cbfe42ec672d5430c5142fbc967bc1885ba884314

                            SHA512

                            d2668aec916c69eca190d88d16e4c04e53f810112a5f9d375e83cad8292b0247847a7716efac9c6e5c290feee548cdd39574dc8fb6b7a7d4e5dae26e5cdc1b7e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Valyse Launcher.exe.log

                            Filesize

                            2KB

                            MD5

                            ccd4478192de0b1d490911683da2192a

                            SHA1

                            403b7559f92d37a1e3ded2053b15ddaab5ae767c

                            SHA256

                            e8f1353b2a56959ef9e92954a2510cc781591f7c0310beeeb57e61149b4aa571

                            SHA512

                            f4b23fa31a79519cf72fe1c7970c508f2a4b727c292bdcfc906121b01be9d2dceb35ced9d7a14bad36eee57f51074b56f0b695ea770eff995583302fd9429cd1

                          • C:\Users\Admin\Downloads\ValyseOfficialRelease1.4.1-b.2.zip.crdownload

                            Filesize

                            9.7MB

                            MD5

                            5a0901dfdb36813e50f9a779a6841d1f

                            SHA1

                            385087aa72b713cc19190c7d364062020dc976d8

                            SHA256

                            c1eab41cfdb38cb9e3c7dab2bcaa8f80aeeb7a1d17485853c6d9624ef6a44185

                            SHA512

                            be4d7cccca684f7e45be473f23d7f42bf9bb1c110250207aabbc50abbb204ce7758e3cc732215f6c9f9ef20d60ed05605f8e6afe923390aa31b288dcd55e1642

                          • memory/2276-175-0x000000000AAC0000-0x000000000AAD0000-memory.dmp

                            Filesize

                            64KB

                          • memory/2276-174-0x0000000006D20000-0x0000000007348000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/2276-176-0x000000000A020000-0x000000000A058000-memory.dmp

                            Filesize

                            224KB

                          • memory/2276-177-0x0000000009FE0000-0x0000000009FEE000-memory.dmp

                            Filesize

                            56KB

                          • memory/2276-180-0x000000000AAC0000-0x000000000AAD0000-memory.dmp

                            Filesize

                            64KB

                          • memory/2276-173-0x00000000066E0000-0x00000000066EA000-memory.dmp

                            Filesize

                            40KB

                          • memory/2276-172-0x000000000AAC0000-0x000000000AAD0000-memory.dmp

                            Filesize

                            64KB

                          • memory/2276-171-0x0000000003F60000-0x0000000003F61000-memory.dmp

                            Filesize

                            4KB

                          • memory/2276-170-0x0000000000650000-0x0000000001CD0000-memory.dmp

                            Filesize

                            22.5MB

                          • memory/4328-186-0x0000000006E40000-0x0000000006E50000-memory.dmp

                            Filesize

                            64KB

                          • memory/4328-187-0x0000000006E40000-0x0000000006E50000-memory.dmp

                            Filesize

                            64KB