Resubmissions

30-04-2023 20:16

230430-y169psah37 7

30-04-2023 20:09

230430-yxckxsah25 10

30-04-2023 20:03

230430-ys13qaag96 7

30-04-2023 19:55

230430-ym5hyscf3w 7

Analysis

  • max time kernel
    209s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2023 20:03

General

  • Target

    ChatGPT (Bot).zip

  • Size

    7.1MB

  • MD5

    d2f022536243004be4a21092f99b8d0f

  • SHA1

    856b042c9fdf1604679be190acb1c2068cb52730

  • SHA256

    c1fe20b075cd91dbe6454422825af7b98d5e4914c00f81612c18a5be7f8cd509

  • SHA512

    076e79b7521467a3e204d5cf820f6a312bf9eb8d581b0d0c6a6d96235c9f8284fed92d8b3a546fa6b0603743d5b90f64f6b596e13b2b44efc63930e09e3e5852

  • SSDEEP

    98304:3unHAbqD9nF3jbQD3l6rMgXneBMYFzxVyOax5Zg2ILh7shAUA:3unHAuD9ljzG3xAZ/TkshAUA

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\ChatGPT (Bot).zip"
    1⤵
      PID:896
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1260
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3584
        • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
          "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
          2⤵
            PID:4848
          • C:\Windows\SysWOW64\unregmp2.exe
            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Windows\system32\unregmp2.exe
              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
              3⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              PID:4772
        • C:\Windows\system32\SearchIndexer.exe
          C:\Windows\system32\SearchIndexer.exe /Embedding
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Windows\system32\SearchProtocolHost.exe
            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
            2⤵
            • Modifies data under HKEY_USERS
            PID:1620
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
            2⤵
            • Modifies data under HKEY_USERS
            PID:5076
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          1⤵
            PID:2148

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

            Filesize

            256KB

            MD5

            9c481a94abc7eee23cd5234262e60077

            SHA1

            2873225e708fb5461ac60c3613fe12112423f0f0

            SHA256

            681c9665d741ca6ed709cdd79d070ff7f4fdf158e02342f7d47e90a6d962b061

            SHA512

            0579499b5f01649f7e5e3afad07b4c7924d30fbc56dd12b37d9ad46bdefe35fcb6371694c1eff6c42d56c21b1de4c4f40531b27cd32eca1bdf51c6cac41fe668

          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

            Filesize

            9KB

            MD5

            7050d5ae8acfbe560fa11073fef8185d

            SHA1

            5bc38e77ff06785fe0aec5a345c4ccd15752560e

            SHA256

            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

            SHA512

            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

          • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

            Filesize

            1KB

            MD5

            084def6a415a0508d4eb51ef3b30b44e

            SHA1

            86ddc67d3356b6f3f3d8553f74bb7763516a6c65

            SHA256

            dd96d74884b366d4ac9df3a25801d531d1440a8fc56d8ec98d6610d188db32fa

            SHA512

            86805c166188dd55a9a54be8e2ef900aad898495b61a927a10b6ba94c2ce66c4b098805d9a9b0bed20ecad11b1096532673ea6b3dd47228140ab56f5808e95b2

          • memory/1084-167-0x000002221E770000-0x000002221E780000-memory.dmp

            Filesize

            64KB

          • memory/1084-183-0x000002221E900000-0x000002221E910000-memory.dmp

            Filesize

            64KB

          • memory/1084-199-0x0000022222CA0000-0x0000022222CA8000-memory.dmp

            Filesize

            32KB

          • memory/1084-201-0x0000022224410000-0x0000022224418000-memory.dmp

            Filesize

            32KB

          • memory/5076-206-0x00007FFE76F00000-0x00007FFE770CE000-memory.dmp

            Filesize

            1.8MB

          • memory/5076-273-0x00007FFE76F00000-0x00007FFE770CE000-memory.dmp

            Filesize

            1.8MB