Resubmissions

26-05-2023 11:29

230526-nls4esfb93 3

26-05-2023 11:27

230526-nkymhsff8z 6

Analysis

  • max time kernel
    599s
  • max time network
    594s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-es
  • resource tags

    arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    26-05-2023 11:27

General

  • Target

    Evon/bin/Monaco.html

  • Size

    70KB

  • MD5

    8376a0234b6a77d02648ccfb76759bbe

  • SHA1

    617c9f9c623c139c1546e1c6e367fcd3c4cb293a

  • SHA256

    1715131f85de31e755fe0453c6c44fd10acfdd18577c60ad688e8bd309603d41

  • SHA512

    89376e23c44678c0d418bdf30f448ced9d69b8d6c4a509c33076e3e091c91f559016657e6bdfe01f5ef906c0e74bd1156d96abed5d33db4d011c3ed0174fd217

  • SSDEEP

    1536:AwmVPlSG/xJ4RyTbNfBf8XT/p/gmFwZKvWPvGVW2P2zVf3xgoaC:3mVPlSaJ4RyTbNfBf8XT/p/gmFwKWPvT

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Evon\bin\Monaco.html
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd877e9758,0x7ffd877e9768,0x7ffd877e9778
      2⤵
        PID:2476
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:8
        2⤵
          PID:1972
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1340 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:2
          2⤵
            PID:4388
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:8
            2⤵
              PID:4660
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:1
              2⤵
                PID:2736
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:1
                2⤵
                  PID:4864
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:8
                  2⤵
                    PID:2908
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:8
                    2⤵
                      PID:5048
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:8
                      2⤵
                        PID:756
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:8
                        2⤵
                          PID:5104
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3572 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3352
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3564

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Discovery

                        Query Registry

                        1
                        T1012

                        System Information Discovery

                        1
                        T1082

                        Command and Control

                        Web Service

                        1
                        T1102

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                          Filesize

                          653B

                          MD5

                          83efe0ea0a23ab6f6d1c9b61351effc0

                          SHA1

                          925a2cf92859122ecd015c7457daed02b6ac232b

                          SHA256

                          b219edcdee27124fad72f5835ec5d8e14b9262ad6e809e5d12cf5ee851cc4467

                          SHA512

                          2bbcebc7bf41f0705effd39b6a3741537231d14135900d6c4e10b8ab134bfca384ee05220477f393331b743afdf73105c2f12ec71dd8cf3421fb120eb625e26d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                          Filesize

                          539B

                          MD5

                          67adfef0a4e9c7500b56dd7fb4133e22

                          SHA1

                          2c461c4bcb9dda5e5bd75200c05b27266d712875

                          SHA256

                          cf3abcf680585fd3e4ded4ce40513b6c1325c270afd38ed45bc39aec16b31882

                          SHA512

                          93bb6721c96f63b8860c429f217832fc3dc98e7e9ae1302bc0866d0ceb1eb9cb039180f3b288450e26c66c5d710829fb347525bd26a3038dd7c7a75012a606ab

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          5KB

                          MD5

                          f71f9ca82429356dcab00a0fd7db631d

                          SHA1

                          883f7ae569d4913abda8d939fd1a1104eeb10fde

                          SHA256

                          9ba3902db71538ac5112de1cd95ed0d5979f7052cec41d8af11c652825f9f084

                          SHA512

                          9fb2ebfae7336576e24e2a7ff76cf9483d88cfcfbde2e9beaf102b420c5aebf1cbe92faa917d2b5f4e6f35b7715b757edf58093205a19176706141704ad92622

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          5KB

                          MD5

                          ada9f761b12f64f3cd8c0a06dd68706c

                          SHA1

                          2d7af33a744b30219756a78b3026ec564829faed

                          SHA256

                          41bc5873c36cea96b7069cd6234c352d3868255445d7c037f0e0821b19b21feb

                          SHA512

                          f68502f8a8bca2b29fea1177dbb32284996f5d33e386dbbbf9c580bf5d9087efe6a93208340917c1f3163969af2ed569c43f92df98a7a3b0a50f639942544f96

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          5KB

                          MD5

                          e18c2cbfd4f3fe9adec089946b814635

                          SHA1

                          906d55c78cc8ce2af23f8f73db64fe6386f8934d

                          SHA256

                          d495ef0d4a026d63447d474b7e5c43f6b192880f8643f78311b0075b00e8ab6b

                          SHA512

                          6668c7a2d85335b0ea76cba0342e1e81b6b65a7ec84b00292f6be0c6fb46860e7cac2374b82a2f1fb5d736e09a1661dadd2eaab3f6fdd94eeeeba9613a6b9b13

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          156KB

                          MD5

                          4b40b665943861ba9d155473f42003e8

                          SHA1

                          fb1f2c430bb9c9ea5f3b9e174b98ba00ad60688a

                          SHA256

                          9bdba2563f6f10c808a82db26f3593302c43d83cc542466b8bc7e76e7f7c556e

                          SHA512

                          934feef64cab326a7be42c0dee49e1c0196da1cd3e4d768d44c1e26c81bdae51553d696b99d80c4fa061907c732e6c5e028d516682b68fecf8e36525b1bab599

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          72KB

                          MD5

                          381b9215a3f8fd3d1dd9ad1bd81e6e2e

                          SHA1

                          f81728172e137ada1d00df715a1b17b624c3162a

                          SHA256

                          1de9a836a95fd1e47bcfea390b53bb12d0f5ab60fb278224d3c215f50f5b4617

                          SHA512

                          0347d5eb3c4ca9407f1adf467f72ec8a1a4d641aba9909d912606651435ca476d3320e92f43f70537fb0a4bd4d787ec93cfd037f5ce394aecdcc3148b0804613

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          155KB

                          MD5

                          c6f2754fe904326e356ca6a8168178d3

                          SHA1

                          9d0ff71784addbc440136563aecc45d7f720ddfc

                          SHA256

                          99469260f8baf29bb0e797908f5325006118258fa4d161f4987c36dc9f0dc0ee

                          SHA512

                          df1b650df5f205042cacadc4a24208d22f25c1dd1598f10493bdc95b41f1f2079919429e13fc94c8d3497e8c2d7ecc3935e0f021a8fd0fe500985d4c552a00c5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                          Filesize

                          155KB

                          MD5

                          c437f0acb606ea474e9c9e1ad0d9ffad

                          SHA1

                          b14e231db7a41fdfa747145bd84b1b6ce3789836

                          SHA256

                          aed091177fb4c169ccd8b1276734fb20ad38d64338971e5d9219b681c960e45e

                          SHA512

                          77280e77455af9e03ed2b0db9f86109cf15f376e68c56ac502cbe343309d85a15bd12a5207cb9d9f9857de78b43980ef936a3d9eb6d1ca4e98883bdaa2982afc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                        • \??\pipe\crashpad_3712_VYHHUTGNHFLHGIEG
                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e