Analysis

  • max time kernel
    300s
  • max time network
    285s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2023, 14:07

General

  • Target

    http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc29de9758,0x7ffc29de9768,0x7ffc29de9778
      2⤵
        PID:1892
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:2
        2⤵
          PID:3440
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:8
          2⤵
            PID:2464
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1296 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:8
            2⤵
              PID:2916
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:1
              2⤵
                PID:1008
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:1
                2⤵
                  PID:2368
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:1
                  2⤵
                    PID:816
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:8
                    2⤵
                      PID:3940
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:8
                      2⤵
                        PID:3852
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4716 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4072
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3736

                      Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              867B

                              MD5

                              891be8e8a2f194816fe4ee8cb0bdd037

                              SHA1

                              134abe450681cb1f517451c325cefda9b84c9465

                              SHA256

                              8c403213c53689334236a398669a5ad8dd2d1b73c724a4a66aafb5f818c14cfd

                              SHA512

                              9b76967a49e71b73bef9d3eec77c187c71dfeebe6b49218379f971be0f208b0f2b543b083be6f440ba5dab63df0e1ba4be3e6939f31e9aa3aa6b297500ad8d9b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              537B

                              MD5

                              f176f107ed674e22989891955c47c6ae

                              SHA1

                              e646999fa2bd75ed5eb08bb26c2e07c58f9e6648

                              SHA256

                              05f675cca0edc22568577b658041288c84d15e48de3712593142c6e0b0544378

                              SHA512

                              f7e341d84bfdb4f5cd0a5ce3e9b9dbf5eceb7c0287df7d0cdd022ea196b47e62779f312083a42aa49148da76abaeaae47c33c166286c61c15eb7f5deb51025a7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              b97ce8690f8addaa9fdc30030a7dd64e

                              SHA1

                              71842b9ddc03281d85182e147029778221f8c7bc

                              SHA256

                              2946d7a25ff08fbe9a8ccac2d905f51f4d8036dc808b916851b0f14edf66e66a

                              SHA512

                              9f68c19ec441a56bfe3644ee7fe24d8566ebabe4c58810ed49e47ead7a533e1565be75060a2dc40dc3dfa5d292d0e01b5f8f23cb4bd17347d71b83e939bca033

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              885d0d15c1619b3fd3cc17b1cf6282c6

                              SHA1

                              62e6f9645acdddf781cbe3c99f7bdf4687bdbd3d

                              SHA256

                              fa86d044f2c086fddc1dacedfcf4cf47dfce9dafc24e1c4d1666a911d308df86

                              SHA512

                              9be2b877d7e0f7afbe38a8bc7b00026d044e0d77536e878b0f610f57135fe7b04e08a58bca3aac8252177e0845780f3ff653bff026594155436b3dfd646980f4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              86a0ca581d3aa9919e2f494ffa14c72e

                              SHA1

                              0150c93ebbfa20ffa55a6d2aadb1d136f1169f22

                              SHA256

                              1a7ae43863ac466a58bd9b7efed650e2de01ef7178639af778de88103e34e09c

                              SHA512

                              27a54bbb7e8b8bf540e2bbb111739165d6510c7289025accdfa9e78a660af999bb5ff2c359a8fcf3558abd71d244af5ab264d4c317ea81c9930931793e233b91

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              200KB

                              MD5

                              7311a815fe2a7d7fda6c39febe39c7f0

                              SHA1

                              c871076fae91cc664d07ddc5206c870fb71fb08a

                              SHA256

                              e136f5024eeefcdc3963febe3b4d1d34c28f8e3489d1f930b9aa813af6292449

                              SHA512

                              68e57e0c0820147928792fce60f2f0c77d9db6cbb7d9a1b1b4d1362053c0cb6b51392f8760328eae51ca4257c5b9938ff7feea31fee025f93f1bf1135e8d4011

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd