Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 14:48

General

  • Target

    https://bit.ly/40BjxJL

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/40BjxJL
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce86b9758,0x7ffce86b9768,0x7ffce86b9778
      2⤵
        PID:1960
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:2
        2⤵
          PID:4760
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:8
          2⤵
            PID:4052
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:8
            2⤵
              PID:4904
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:1
              2⤵
                PID:3904
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:1
                2⤵
                  PID:4220
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4800 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:1
                  2⤵
                    PID:1396
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:8
                    2⤵
                      PID:4160
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:8
                      2⤵
                        PID:2924
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1092
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netsvcs -p
                      1⤵
                      • Drops file in System32 directory
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      PID:5080
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:216

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1c8143e2-d03c-47c0-960a-b4a935340416.tmp

                        Filesize

                        4KB

                        MD5

                        0797ea2e43b8d434f63e3750b9b3c4a8

                        SHA1

                        bbf236b0b34728248b085777d5ac3a6855b0ce1d

                        SHA256

                        ac5d3bbb4e56eed1323fa313dd67db34815c3649a144df63d9ea010b68f6f418

                        SHA512

                        8aad5a836f29f251d83b7f44a171099e205355c81ea69a848a40fa4231c689a040f321fdb4e79c0c20a2cc657eb14cf48d74f84f62e931059a291a1aa1461ca8

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        648B

                        MD5

                        1f45ecb63dea6523d370c5b6434a54f0

                        SHA1

                        26b437497fa6f29133c3290af2327177641801a5

                        SHA256

                        e7cd9f33c994109892418394568695c2532532a26074007d8a5235c939ca2a96

                        SHA512

                        3cb20104b83e18234aa9ef8fe4254934b4660c7e975924a2f9a68d5adeefeca8748baf1224f5178418bf25bd91bad1021042745af52ce0e58b11fa3507efc5f5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        b41293672d7e1889fda740f3172dde3e

                        SHA1

                        f7e6b1d68a8e90b8751124ebbd91024ad1da1fbe

                        SHA256

                        1e076cea01ce02ffdba3f97ef9592a6ccd075585ef205c4d051f977438b4c77e

                        SHA512

                        6c077cf329a00ea1a0c3d2438c8fb87dceefeea28ec5b49debcbbca7be6810b061eee9682f886458a98d2a4c79feca83a21f8491f3bba2e225423825ad338147

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        59a7f1ac2f0118efecbc04f4e7642886

                        SHA1

                        f7e8beeb92b76180a8daf4b8e84c3450c94b8e16

                        SHA256

                        932c0992398c20dd5f02f67b1f2e0ec3782a10d271cb5c4a2106d76579882c5a

                        SHA512

                        9ee40976512b44e09ed23c6704c8c38433d6ed12c2b6efa6c41d80d064e203ef64a678d9ef36cfc8af34fa42829eaffb23ab65e7989e6151dca8ea7a1f22dc21

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        874B

                        MD5

                        991208c00612fe6e0d8e13c2f5254fcc

                        SHA1

                        c52e811aad115b0536508d53857296bf9a3e6dd0

                        SHA256

                        fd55374d26fcf92ee74b138622be00757165004cd5a0d4dc11ba75a038c4b6ab

                        SHA512

                        80c6ece4d8ea76a1c93fad876078d3c28140687fc71e05579bd46937c4aea224b95706ce993606d9de37261aaf0fb2a48e2770b4e1a7c7bfcd62cfd8d6aa5dc9

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        ac90a116091461720b8f91ca1bcbd9ba

                        SHA1

                        00660847b7d5ddca10bb0283f8ede1837815b30a

                        SHA256

                        7073dd1670e29a8a76bc05e30cc262ea1a8c2f07c6424dbd7bb32d207cd6efb4

                        SHA512

                        46ef630fc6954eb4b29b2f3af59dff48a09922920149beabdbddc94fb7345d7d72c498ab4dcc1db76e6ab49c641d76c801c253c813be630070784b83caf7bdf3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        0e8324293ee52e39f92526474b17f77a

                        SHA1

                        c106795e67b1c4f006c23c2087999b87aa5b95c6

                        SHA256

                        970bfb1e675eac61ecbad249b1181be4bc727373b012e3938f7afb01100fd976

                        SHA512

                        f6b643d8f3155ffd815d560a1611914a20f8dc7e15d765d42153a8ab5d67bf2b5073c77dca872a0b8b179be93af87a624e7aabbea27e960d72b97d5c77abd340

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        42083a4c841091659733a9288ed99af0

                        SHA1

                        b91c9f05d4be12f97e3da9c0ca25b54de1edfccf

                        SHA256

                        328b0dc6cdd7e1603d66e58c7f984b4bf8abf8ec3d5151e898bb68a5ec1c1ace

                        SHA512

                        95955f12bfca85508cfb91a2d8ba0fcba1220cf13834f4453edd8bb364e2c67c0094ce9359a818591e3d380d56b0dc051121cf0a64dac2a2475cdb51fb0e04db

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        4KB

                        MD5

                        9b22705268511f342a88b45cb626d46c

                        SHA1

                        f5546ec15f0ec9c367ec9d04c12ba04d969fc73e

                        SHA256

                        164820dcca8f45c7ab56d2c7c337bb845dd0fb657b5ef6219b28200d5da3e1a1

                        SHA512

                        c407e779880d52057db25f3e3100e991da84897e9dbe1c1cba65731bd4505f0e83788d23de2fce89cb0cc667e5cfddb6fd65636ecb71f19c3a32c24cd8c772ae

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        200KB

                        MD5

                        38c2b09eca83541127c8f9ccb7a34535

                        SHA1

                        b25506037addfe0c39418adbac4134f282c10656

                        SHA256

                        33dea75c87fa402693d12bb20e7f5b8532412ea1d1211e14ecb436765f289690

                        SHA512

                        539461ee51eb0df69676ffd45717faa7cb027118d9e3375aa5e810726722126567e99d5125876573b51f490910546bf2eef158147f701f168d2104f2e2226060