Analysis

  • max time kernel
    600s
  • max time network
    500s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2023, 20:20

General

  • Target

    http://soft.polyv.net/soft/PolyvCommunitySetup.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • NSIS installer 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://soft.polyv.net/soft/PolyvCommunitySetup.exe
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9aaf9758,0x7ffd9aaf9768,0x7ffd9aaf9778
      2⤵
        PID:4532
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:2
        2⤵
          PID:5084
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
          2⤵
            PID:3760
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
            2⤵
              PID:232
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:1
              2⤵
                PID:2236
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:1
                2⤵
                  PID:3832
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5268 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                  2⤵
                    PID:932
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4976 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                    2⤵
                      PID:4608
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                      2⤵
                        PID:1184
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                        2⤵
                          PID:4524
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                          2⤵
                            PID:4868
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1676 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                            2⤵
                              PID:4720
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=836 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                              2⤵
                                PID:1164
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:8
                                2⤵
                                  PID:4920
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3540 --field-trial-handle=1760,i,5594376509455192053,17823615671229232380,131072 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3900
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:1728
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:3888
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                    1⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3880

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    c9f981c04a90274a9bef735de2e62851

                                    SHA1

                                    7b9113b9147838503e0e1a57a093def36d781e45

                                    SHA256

                                    274bb776aa26a5eb04addcd6dd7bc8907a426cb7edda04d7aa12960938a82b23

                                    SHA512

                                    d6c36059af7ba9b25778a1b6418ec7b8f52a9e61a6e52f1d04c7e768518f48a44e071bf38bbf46d63e0c0e4d89d2afbc7f520228d9b436954c09541cbfc84251

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    bc68dda5480d41f43b69461e6d068de6

                                    SHA1

                                    554c69f4e6963f08f6e377dec606ed2c1b6ae6cc

                                    SHA256

                                    a55257b8526dce13f5c20c4f775b923e51b750e200b7bc15aea0066798beaf99

                                    SHA512

                                    29f604c40c1ab4d24862240b364353c007c4a84558aa32840c16c351ecccd25880acf9dd62c8cd5cc1e76bdd0639b8087cf2b93ec509b28276704e16667cc1a1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    7ca98f2986c38067dd7a6d7220587d1e

                                    SHA1

                                    2a66a856e7c339a5b01426a33a4b2e526559e77e

                                    SHA256

                                    56dc9f75074b11c347e1be4758dc2372ac8a1e8f008154f9e5617bb345f2e0ab

                                    SHA512

                                    a573c298b71ad892e123abc57ce1cc97f469d613c39896b422aaedcdb2f02132740897e9eb521a115d35f5953168bc4e66677e6a543b3dacd2b19cb121751992

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    c8da4fd7542a542ebc50c33944748fac

                                    SHA1

                                    8b9bb5a561c281859e4425ec6578f73344adcd17

                                    SHA256

                                    cdd1080129a641af587aa5c65a6b1d8e265438a4bd4ccbabe34b148bfad29eb5

                                    SHA512

                                    e3174b3b571fc1c50b1b6022406b7e3157378292f2cdd75b19c22eb1b48695b35ace4a2a84fddae8edb22e96e619221ea1077b59d2d81f52178550d302738889

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    150KB

                                    MD5

                                    69a0c233c175935ce6cd7030b3519dac

                                    SHA1

                                    0c6422885b6d9561bd53396bda9fff72da849fdc

                                    SHA256

                                    adfc05d37350a30d56aedc4d6c081d5162b9cbf70823fb9b509ada26bedc5721

                                    SHA512

                                    36d2757163771ff06d2866d699c36718057053461ea170bf5bade0966434946794ea74f7f4e147ae98d8271fad103e7f96d3752bf3a6f44814006857db0ae899

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                    Filesize

                                    106KB

                                    MD5

                                    25ac7dd35674169757ae8b48db00464e

                                    SHA1

                                    cc6dac77ad6725f1319ea26830bfdcb0af269eda

                                    SHA256

                                    b89b857cbab6a01b811bc1dab69149af9bbd1a541537e27c6b42b7bd6ba42388

                                    SHA512

                                    a65610bd449570252ce3850a21d46913fcced8bbd6fa54bccb22420778449be35cca382636d2d979a5b08aaea31f98561e74fd920ae373f1a2b4bb17777776af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe585e19.TMP

                                    Filesize

                                    102KB

                                    MD5

                                    6cb979a18e296bcd373ecef936f09ae3

                                    SHA1

                                    b180bdc15b9c056d95ec50605dff4d58901ade38

                                    SHA256

                                    0395277085f2586073d74d9596c5fe481fccff4a925330134b946f45763a9cf0

                                    SHA512

                                    4e47d0fedf17fa87b982e5689178d2818c04d001b161d6c7a01545107b5f9e020d17058d38f85864103d5b8738b8e51d364c6b53042c980b21295a71ed51a602

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_13lxbbgp.oeo.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\Downloads\PolyvCommunitySetup.exe

                                    Filesize

                                    90.5MB

                                    MD5

                                    67461a487629063519e66354fcebb534

                                    SHA1

                                    d3a57a2d5ba2e641601e80c0970a00d4903aea06

                                    SHA256

                                    ebe20b2b101cb2b06768762a1b3b5f6eca5587307864288c380c626748cac9f7

                                    SHA512

                                    06e674cfc44efb9a8217dd5149a331510d47475dc32f086d7ff18aa322001065134bc8d08fa91cca1a4e762e667bd9469c823e9e2c6ec2d8f36055b22ebd8743

                                  • C:\Users\Admin\downloads\PolyvCommunitySetup.exe

                                    Filesize

                                    90.5MB

                                    MD5

                                    67461a487629063519e66354fcebb534

                                    SHA1

                                    d3a57a2d5ba2e641601e80c0970a00d4903aea06

                                    SHA256

                                    ebe20b2b101cb2b06768762a1b3b5f6eca5587307864288c380c626748cac9f7

                                    SHA512

                                    06e674cfc44efb9a8217dd5149a331510d47475dc32f086d7ff18aa322001065134bc8d08fa91cca1a4e762e667bd9469c823e9e2c6ec2d8f36055b22ebd8743

                                  • memory/3880-234-0x00000256C50B0000-0x00000256C50D2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3880-239-0x00000256C50A0000-0x00000256C50B0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3880-240-0x00000256C50A0000-0x00000256C50B0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3880-241-0x00000256C5590000-0x00000256C55D4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/3880-242-0x00000256C5660000-0x00000256C56D6000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/3880-248-0x00000256C50A0000-0x00000256C50B0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3880-249-0x00000256C50A0000-0x00000256C50B0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3880-250-0x00000256C50A0000-0x00000256C50B0000-memory.dmp

                                    Filesize

                                    64KB