Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2023, 12:21

General

  • Target

    https://mandrillapp.com/track/click/30997027/app.cuseum.com?p=eyJzIjoiRDExWFVKcWhZRHVnUEVuTThtcEJjV1JnWjJVIiwidiI6MSwicCI6IntcInVcIjozMDk5NzAyNyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5jdXNldW0uY29tXFxcL3BcXFwvRXdScVpiXCIsXCJpZFwiOlwiNjU5YzVhMmM1OTIyNGM1NjkzZGRkMzZmYWQ2ODQ2YmVcIixcInVybF9pZHNcIjpbXCIxYjNhODg1MmQ0Yjc1ZmJkYWZiZDk1OGRjYTVlNWUxYWNhNzM1OGNmXCJdfSJ9

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://mandrillapp.com/track/click/30997027/app.cuseum.com?p=eyJzIjoiRDExWFVKcWhZRHVnUEVuTThtcEJjV1JnWjJVIiwidiI6MSwicCI6IntcInVcIjozMDk5NzAyNyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5jdXNldW0uY29tXFxcL3BcXFwvRXdScVpiXCIsXCJpZFwiOlwiNjU5YzVhMmM1OTIyNGM1NjkzZGRkMzZmYWQ2ODQ2YmVcIixcInVybF9pZHNcIjpbXCIxYjNhODg1MmQ0Yjc1ZmJkYWZiZDk1OGRjYTVlNWUxYWNhNzM1OGNmXCJdfSJ9
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc29de9758,0x7ffc29de9768,0x7ffc29de9778
      2⤵
        PID:5000
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:2
        2⤵
          PID:728
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:8
          2⤵
            PID:440
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:8
            2⤵
              PID:1040
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:1
              2⤵
                PID:5116
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:1
                2⤵
                  PID:2660
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4784 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:1
                  2⤵
                    PID:3632
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4796 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:1
                    2⤵
                      PID:2728
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3512 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:8
                      2⤵
                        PID:1564
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:8
                        2⤵
                          PID:4940
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1816,i,12188336145291286993,10455686606279505958,131072 /prefetch:8
                          2⤵
                            PID:4312
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:2024
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x408 0x4a0
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3180

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            624B

                            MD5

                            6728c545233f0d2dced428b8077fb3d5

                            SHA1

                            7106cfbc285d6cdcfe712c4c2ed50511caf41b1e

                            SHA256

                            58f8d544d601ec19612305a5ce93c5d2b227ce0cd7c8cf87a7fa00469e11155c

                            SHA512

                            d94eb8f8249e3e8583e56511b89492379d7d66de08ee469d896a6fac86c813cc3113f605a8f70b08d01bd24ec94ab8928ab4188232e93961e27204b98089ee90

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            29f1c1e19513b7f355593ad79501ceb4

                            SHA1

                            39372de86992cf353e6e9e892ca599891c8576ef

                            SHA256

                            c7599bc249fb10c769923a43670793cef89c077936d045aa5479cd228478e952

                            SHA512

                            45fb5cf496a5a67e6dbe9ab8190239caa5521b3f2ea403d7767cacd132b73d5f891db9c16c47ca39dffaa36fc524dcc7c5e8f5c1e0bd787d12d672556fb66d7a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            e55fb60a54fda0c6fc3ec496a6098df4

                            SHA1

                            bca1de72f82ec27eb4ccc865e2fe8baf2be06dae

                            SHA256

                            2930d79939a33885e9d1b1249fba8c530417c9eae26bd9588fa237a1058b097d

                            SHA512

                            0c32099003de2b1ee55b6fe42ae93a250514acc0187b96852f7bb879cd0a98d8a9b6e296b0276255cd19d252770a2674eb49502d525f4e2130df30eb56f7473f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            6bacc078a77d88390b2dc809ef98e569

                            SHA1

                            bd7c038c26ed7d428389bbc0d658035351975250

                            SHA256

                            9a95515a7c20ea23ab3f2e6a2dac4e665fabd03410af60f0b74ab19520ba0468

                            SHA512

                            08d7df20d12b058ecc81dca44111004682ff40f36617c09372a24a9719708d9311f4c273a300281f7e8b8c66a5982d8c04e888a23fb4abe6bc492e67b81cd7bb

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            b322b54b1d3fc225bb1052d751aef32a

                            SHA1

                            ec41fead3951e1d1c9bff2c35cf357b00e0c5a4b

                            SHA256

                            a3d5165d5f5ad7c4e7310704ae9cc14abdb5f344dec7a00abfb10f271399b38a

                            SHA512

                            67d719b1472846c1992cb81985b9f0315216c7faa822fd660a5e0fc2a9c1e4a5e1ea4795476c0d251680099bec45c83cdf8309ebe93a177df6198db1f2e38bb4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            a1f1a88db20b2f766cecfc34a531961c

                            SHA1

                            54b552e36449506c245441ed841960e1623b00fc

                            SHA256

                            7a06351e2ff97fd45f1e29dcb83c7c4395bdc694e5d4426bc1538f023d356440

                            SHA512

                            4d46454069e39c7f42228a0b32340083ea4cacdf95cb63db84f5339f77e215af6854ee46854bf82b919769b3599b1077437e79593da3bc57ee636473e2305034

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            151KB

                            MD5

                            bbca0c249e668eb092cf083a0aa3bf93

                            SHA1

                            56062869a07ee897c5a50332997b95c5b5b2a66a

                            SHA256

                            ae94716d7f347b56e615433daca08e5f50dd99efa7c1115ac72044fb14d332e4

                            SHA512

                            10b0362db3452ae4fff7c8c8be3d25b2287a0294a22174198155cfc61782b958e2616af42a5ecd440739350f096aca5985d1259a0649ff917c94fb6ae445d403

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd