Resubmissions

21/04/2023, 07:06

230421-hxatbsef39 1

21/04/2023, 07:05

230421-hwkbdaef36 1

Analysis

  • max time kernel
    56s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2023, 07:05

General

  • Target

    http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1&gtm=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=&currentp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1&gtm=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=&currentp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb46e39758,0x7ffb46e39768,0x7ffb46e39778
      2⤵
        PID:4572
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:2
        2⤵
          PID:3156
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:8
          2⤵
            PID:1996
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:8
            2⤵
              PID:3672
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:1
              2⤵
                PID:2364
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:1
                2⤵
                  PID:3432
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:8
                  2⤵
                    PID:2680
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:8
                    2⤵
                      PID:3320
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:8
                      2⤵
                        PID:2616
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:8
                        2⤵
                          PID:1988
                        • C:\Windows\system32\NOTEPAD.EXE
                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\f.txt
                          2⤵
                          • Opens file in notepad (likely ransom note)
                          PID:1968
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3092

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          49a0c5cc62cee3e576afff36d353a618

                          SHA1

                          01e5075736fdd3e44dfaf2d7c149e0b111d3469e

                          SHA256

                          504730cf0cb717bda7b320459b701e97cdbbc6fe408d150dec675a5a1e520007

                          SHA512

                          e6fbe1204ab0005496fcb0fd5699866f12aaf953ea6eb0ae43f5a9f345b2531ce81620b023e5f6884342f62446eea4216118f0d9dfc0c3d5af260504dc2cd2f0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          002a6ddafd658853271c21e97fc3e7e1

                          SHA1

                          d4b96435f773feb067c37e0161ce0332ae1edc6c

                          SHA256

                          a778a040db183d121164a32a915fcc26260b2b57f797f85a3f3fd2426bc46cb2

                          SHA512

                          7c30244d8a423eb8f4c3c00f1549d7e2858f7e7dcddab124d1b7d812061c1c1ed196de06e430f7333876628601fada9199cf85b91c19131b5ef54f4454ab6bf1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          200KB

                          MD5

                          69d91301bd8436255290065aba23eccd

                          SHA1

                          cee64921af908b2dde5e24031c68a35419abf9db

                          SHA256

                          02d15346c96f577aa84b94cc52c9556f2f22f0fc001b51bfda770235634a9ae0

                          SHA512

                          8bebd5ba9e0d3e5ff9571ec5021403ffdb37770ab7f080dd3bccb3153e63ce51eb82ca09cf6b163e1b78ddafc525f70c4cd6eec927abd1073e0003043f8cc5ce

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                        • C:\Users\Admin\Downloads\f.txt

                          Filesize

                          43B

                          MD5

                          ad8b6f08655797587cdec719a94efe59

                          SHA1

                          182adf5a140796f81e930649d05654dbf22fd5b7

                          SHA256

                          77d5fe96defd6c8c1e3b0466b4827cf83dc7e5c727a10177e115d25132fa86f6

                          SHA512

                          519a8ea7ce2ed8661cc72d58bc0c02e721ef8e64608f4d2e26a56a970d43ebbf21bdf579c543ee1dfd667da8f87467c60111a3e6d246d435a5c2d066ab88efa3

                        • C:\Users\Admin\Downloads\f.txt

                          Filesize

                          43B

                          MD5

                          ad8b6f08655797587cdec719a94efe59

                          SHA1

                          182adf5a140796f81e930649d05654dbf22fd5b7

                          SHA256

                          77d5fe96defd6c8c1e3b0466b4827cf83dc7e5c727a10177e115d25132fa86f6

                          SHA512

                          519a8ea7ce2ed8661cc72d58bc0c02e721ef8e64608f4d2e26a56a970d43ebbf21bdf579c543ee1dfd667da8f87467c60111a3e6d246d435a5c2d066ab88efa3