Analysis

  • max time kernel
    24s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2023, 02:55

Errors

Reason
Machine shutdown

General

  • Target

    https://files.catbox.moe/kyga3i.lzh

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://files.catbox.moe/kyga3i.lzh
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ca9758,0x7fef6ca9768,0x7fef6ca9778
      2⤵
        PID:1720
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1236 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:2
        2⤵
          PID:1548
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:8
          2⤵
            PID:540
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1676 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:8
            2⤵
              PID:1532
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:1
              2⤵
                PID:624
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:1
                2⤵
                  PID:1340
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3268 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:8
                  2⤵
                    PID:2316
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=4056 --field-trial-handle=1336,i,16994957686667258885,12740422136867475391,131072 /prefetch:2
                    2⤵
                      PID:2488
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:1984
                    • C:\Users\Admin\AppData\Local\Temp\Temp1_kyga3i.lzh\New Offer.exe
                      "C:\Users\Admin\AppData\Local\Temp\Temp1_kyga3i.lzh\New Offer.exe"
                      1⤵
                        PID:2708
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x548
                        1⤵
                          PID:2836
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\kyga3i\" -spe -an -ai#7zMap5265:74:7zEvent26564
                          1⤵
                            PID:2980
                          • C:\Users\Admin\Downloads\kyga3i\New Offer.exe
                            "C:\Users\Admin\Downloads\kyga3i\New Offer.exe"
                            1⤵
                              PID:284

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                              Filesize

                              62KB

                              MD5

                              3ac860860707baaf32469fa7cc7c0192

                              SHA1

                              c33c2acdaba0e6fa41fd2f00f186804722477639

                              SHA256

                              d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                              SHA512

                              d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              2a3af28434af8d88f908a8ee640f4bf0

                              SHA1

                              b0ba186c57106eae35531ce74245145ec82a897c

                              SHA256

                              a1e16fc54787f4b7ad6c9a74742d4ac27a13a1bb1ed403b0e05561249c2db53e

                              SHA512

                              2f6a3c556c78dc1414a41651703ac2677d51716a647012f9f1cffdd1448aca4f9351557276b86ebbc8cfcc42d31a3e2e0702697300e6808f6b26af16db3d11a2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              4KB

                              MD5

                              b8c55eb4bce3e64e5ce0affa95ec10ae

                              SHA1

                              5a5b49ed2b020b885e0e80cbd103f0bd591145dd

                              SHA256

                              1469fe755616ba1b1fe33e2d2ce740efb4b5b5f63817636195bca6c00f4bad98

                              SHA512

                              31cf4585db2fe98746e2cadc43bab924236e321a7e39345f5c4a601e9034a97350ffe7f48ef5a281ce07bfa6d3998ecbbdf44f1ddf294ce5cdd2ab7d5acea69a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              4KB

                              MD5

                              56fd3dc3969191b64acac847e5cd8807

                              SHA1

                              e722fb7c872f4e16b9f5e00099eeb0ccc43e5ff2

                              SHA256

                              db5f420516517d4f1ee498a4e68ce78efd82a7b91791b7f49c75cec5a783da3f

                              SHA512

                              8104afdb999ca49626e634585e3c85e48439171d6516a3b10529509743caec72ec72393839aeb708a8b0824abaf1dc9520595076fecf5e66dfff4280046990a3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Temp\Cab25FB.tmp

                              Filesize

                              61KB

                              MD5

                              fc4666cbca561e864e7fdf883a9e6661

                              SHA1

                              2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                              SHA256

                              10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                              SHA512

                              c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                            • C:\Users\Admin\AppData\Local\Temp\Tar296B.tmp

                              Filesize

                              164KB

                              MD5

                              4ff65ad929cd9a367680e0e5b1c08166

                              SHA1

                              c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                              SHA256

                              c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                              SHA512

                              f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                            • C:\Users\Admin\Downloads\kyga3i.lzh

                              Filesize

                              645KB

                              MD5

                              5387a9adcd965665df77fce4689a19cb

                              SHA1

                              0c62eddc603b661fc7c2515d3028f8ae269d918a

                              SHA256

                              c4fc634d7844a52984194026bcde139743bb0ad6c4c166c45d477e346964b4ee

                              SHA512

                              8ce9b3a545247edec4b5b34bec0cc5eb39cb5af6fc52d2b3f5bcaa3bf606643032590ee161929986ba4f7ff9eba77997c7ef9e3418dd73c7195caead40bbb574

                            • C:\Users\Admin\Downloads\kyga3i.lzh.crdownload

                              Filesize

                              645KB

                              MD5

                              5387a9adcd965665df77fce4689a19cb

                              SHA1

                              0c62eddc603b661fc7c2515d3028f8ae269d918a

                              SHA256

                              c4fc634d7844a52984194026bcde139743bb0ad6c4c166c45d477e346964b4ee

                              SHA512

                              8ce9b3a545247edec4b5b34bec0cc5eb39cb5af6fc52d2b3f5bcaa3bf606643032590ee161929986ba4f7ff9eba77997c7ef9e3418dd73c7195caead40bbb574

                            • C:\Users\Admin\Downloads\kyga3i\New Offer.exe

                              Filesize

                              711KB

                              MD5

                              7f5f314d0b5f3059c85a0902c29aa49b

                              SHA1

                              46fb3e28ad64fbf77afd5f80d70b62d6882d8400

                              SHA256

                              3ef7e58dde46e0656c42ef32df16748f801da8616ee8b626665d6a9279f7d026

                              SHA512

                              78b55547ff6686a8aa265876042c7198d8fb12ebee83fa1e4f88e3f5d5b0bc67c3cc5dcda33ef1f74e25ac8bd471f8e170261e35fd2b8d591b5c8d53b90bc987

                            • C:\Users\Admin\Downloads\kyga3i\New Offer.exe

                              Filesize

                              711KB

                              MD5

                              7f5f314d0b5f3059c85a0902c29aa49b

                              SHA1

                              46fb3e28ad64fbf77afd5f80d70b62d6882d8400

                              SHA256

                              3ef7e58dde46e0656c42ef32df16748f801da8616ee8b626665d6a9279f7d026

                              SHA512

                              78b55547ff6686a8aa265876042c7198d8fb12ebee83fa1e4f88e3f5d5b0bc67c3cc5dcda33ef1f74e25ac8bd471f8e170261e35fd2b8d591b5c8d53b90bc987

                            • memory/284-208-0x0000000000CE0000-0x0000000000D98000-memory.dmp

                              Filesize

                              736KB

                            • memory/2708-186-0x0000000000DF0000-0x0000000000EA8000-memory.dmp

                              Filesize

                              736KB

                            • memory/2708-187-0x0000000004D10000-0x0000000004D50000-memory.dmp

                              Filesize

                              256KB

                            • memory/2708-195-0x0000000000600000-0x0000000000610000-memory.dmp

                              Filesize

                              64KB