Analysis

  • max time kernel
    299s
  • max time network
    295s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2023 17:20

General

  • Target

    https://eurocaseroma.com/sta/sta.php

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://eurocaseroma.com/sta/sta.php
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacf7e9758,0x7ffacf7e9768,0x7ffacf7e9778
      2⤵
        PID:4112
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:2
        2⤵
          PID:1252
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
          2⤵
            PID:1792
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
            2⤵
              PID:216
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:1
              2⤵
                PID:3204
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:1
                2⤵
                  PID:2008
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
                  2⤵
                    PID:3872
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
                    2⤵
                      PID:3948
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
                      2⤵
                        PID:408
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
                        2⤵
                          PID:564
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2764 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
                          2⤵
                            PID:3944
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:8
                            2⤵
                              PID:3700
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1764,i,14627970337354680455,3137987339653547330,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2496
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:1412
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:1608

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                702B

                                MD5

                                ebafe3a9ef7676c758188dd2b94d7297

                                SHA1

                                0986f7014985fc09a900ef78483af2970864564f

                                SHA256

                                98a97a841622e5ed0cde54c34607e37531908766f4bc937e61160755fa0d6472

                                SHA512

                                0eaafccc83bfe9bdcc5387def503d8dcb285d588883f4d061f499c8696560038d995bbb03a77cf8adbf330f221310782ca770d1f87e967d9706bdf2110108d38

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                9fe747717bd83875f2daf65a715d6536

                                SHA1

                                5b6310a8f7757a6b715c630ee1b50ee630ff277f

                                SHA256

                                bb2b5300b3befe6fbd107c0ecacf94e31c92ce93d66c61386c04beba44555eb5

                                SHA512

                                b4409b6e82a4cedf1db82477b37a09c91cc739fe171767a27461ccfb3d05bcb3af0560e6e4421c950b92b31f2d8cd1ab184cc2646429489a334a4e71a37d4326

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                d26ef42df02fef3c82438de70a6cb7ae

                                SHA1

                                cfc9a0dbfaaa247131e295bac69edeace06cd68d

                                SHA256

                                4e56834be26ab901ab65c5a9506ec6478fc010864062bd26699368fa4739ec0b

                                SHA512

                                2cd99d87653932af46168ab216ef15552fdf163db8a03c70866649ca4b2f01cf2e9ca3082e97d9c5da200877d41f3f42b9b6efc396a4c51d91d7bd8bfb5a92b9

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                2475ffb98504c13d66c3a20ddd1ea572

                                SHA1

                                42e6e17139eb7459fe7ced865a1e0ee6b10b6a40

                                SHA256

                                59910285ddce2a513b0b0c877006ce015ed085ea39d31b76d40a7230beb6168c

                                SHA512

                                f0b53e3f979e39f99b55cb90b9535209c4154b195933cb9909b462e6ecf7c1a66213be631847ad999d7a0c32247a9d8294cbd3fd5e5a6132b1bdb892d6b30f68

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                ff98cdc34be91c71cffdc2d417f20a38

                                SHA1

                                2e316de8718963a8323b182d3476b8cce412f3f2

                                SHA256

                                fe77a706464e1dd532b985bb29dd34381e5aec312ffe2665b44c1787cd42131d

                                SHA512

                                9688d33f12401a969ce076f021176fcf0bcd070b586099195c18ee4816a1e44ae3df63ca7da91be933163c9792ff4acbb59eb1f52f4a9132c3f707e655eb072a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                241a5f6e52830fb465596dcc5fb488ee

                                SHA1

                                7e80e6d298658532f667e63002b21cff9faa76d9

                                SHA256

                                c615c6144e3ce68570b1abac2f205e5a3e2c53ac914addfae4ee8f7740557804

                                SHA512

                                a0a2a7c21df465f882b1e69acd38696ac8ece98a23ab37df01cf6f24721cbc68add18aefe2e9eafcdc684496e161898e4ae55cdbb48dab5961733d6b136a923e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                199KB

                                MD5

                                ca66ea579cbd69a69de4096038f341c4

                                SHA1

                                34506ff4c9be7d59b2a69cd79a672bf7c5cb882e

                                SHA256

                                a5744c5dfbf372e0079e8843f5a64ba796d4d9083403515d01cd68bc406b112d

                                SHA512

                                6ebbaa506334a596b642f9732ee4fa14117da15a497362597d69505ff444efe1befbeb8c26b8aa3a6ecedb8e39c25ef4c0f77f388cd5abd57609688c70cc3f3a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                Filesize

                                110KB

                                MD5

                                c122e72c37f2c85fc9ef3b1830370489

                                SHA1

                                f95f86b57aa988eee6393bd8ba2f6db95a987e7c

                                SHA256

                                22c9bee982e7ed69d44957f11045d097a5aa4c295f177dbd79c41ba6ab7cc4ef

                                SHA512

                                71613a59011ec48a6a86250e4cd278a187304b1b98637ec16a160cdc6e7bab6401a5b1073f2de183d8a25fc0725d775592a148dddf7d358168ee3e87ce5663f3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe578770.TMP

                                Filesize

                                106KB

                                MD5

                                e321e4909f26b44150d2ecc335c1d644

                                SHA1

                                d199eecf1ce7bad66ed303b38615eec9c9b5935b

                                SHA256

                                2f1bb0f14892b4d20756295e57b4be59ad2f4292bba41d3ae16c21e610a013b7

                                SHA512

                                2242212e5515e67c541444fd0de52e503821f14e2ee18c1f7fef2e4791f277dfb9324547c9acca7b6f036759312c085f276fdce8d5fc4cc3df6896cb44fad0fb

                              • C:\Users\Admin\Downloads\Hs.zip

                                Filesize

                                99KB

                                MD5

                                d4cc419c6a58f7e5ed392c29db852955

                                SHA1

                                4f329bbf84f195cdafba57c141583b02790840f9

                                SHA256

                                de16892ce409466aa243d15710f2b7eef6622bec05dc0dff6d2e2b06c7bf1e5c

                                SHA512

                                a25feae2544b5e1675ad0bb0809a6dcfa4a633a24a009b1bc7c9776023ebd3534ed9cb74e21e8c004d8b681cd1817c1998071c268e0f8b0ce89cf7867151045c

                              • C:\Users\Admin\Downloads\Keth.zip.crdownload

                                Filesize

                                102KB

                                MD5

                                604b636d1cd64e151e583cfe402c4894

                                SHA1

                                354d6c21db6b27495285fb12fe30293d64ac2fcd

                                SHA256

                                ac7875a3531778cf16c8e5ca0bb2375e8b83e33cbf045c8f0c55e0dd8747c94f

                                SHA512

                                80797ca99dabbce6247b565de54b0aac87e178a6b7e190b4d220be87660fe88c5278cd7870c84f288822d5982ca5645a81d8dd3b824cfeb3a8d92c8de1607aec

                              • C:\Users\Admin\Downloads\Ue.zip.crdownload

                                Filesize

                                95KB

                                MD5

                                f975b5c6b7848ef6eb822b3c3095c522

                                SHA1

                                3ecf3efbee269ec236916b2dbf4bca53a6349c81

                                SHA256

                                f9a794a0488136b2339b386a36f5662c386673a506f1e81666d43fb984e79d8f

                                SHA512

                                5240fc27a7f6cc26a40cea1c15e8ce3c4c1c2e1664e5d8b5ca3f3f0bae8ec829f08627da9aacbb4f3f4c9f97f1f7439927e76a48380bbecb3345c26886d09354