Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 22:30

General

  • Target

    http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c332e9727a3b377a

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c332e9727a3b377a
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9ab99758,0x7ffd9ab99768,0x7ffd9ab99778
      2⤵
        PID:3012
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:2
        2⤵
          PID:1992
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:8
          2⤵
            PID:2112
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:8
            2⤵
              PID:5088
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:1
              2⤵
                PID:116
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:1
                2⤵
                  PID:320
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:8
                  2⤵
                    PID:3608
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:8
                    2⤵
                      PID:932
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:8
                      2⤵
                        PID:2116
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:8
                        2⤵
                          PID:3640
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1940
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3920
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:4608

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            4KB

                            MD5

                            3a715e7f9426848e669f7a0d981da921

                            SHA1

                            1f4096fa568b5301e3bc5e7077e2da6978d6c7e8

                            SHA256

                            2f97f28f7a3f3bfb8ce9e797cd9d0e17d5478bc6710af2fab4c3b9591d3c61e6

                            SHA512

                            5fbf9d05cba730daf803ef2c50ab2fac4887389b03aa2a49cccc591cfad0dbdf0dd63c3d71dba8efbd5fe2bec542e770555686436e67da0e053e66c873a79246

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            4KB

                            MD5

                            1deb8294dd8f2878d55874a548be4e55

                            SHA1

                            ce5d7831d54db82f9cc9bce065e80bc7414b0b67

                            SHA256

                            3907c99ddd7d72d677cfe209d6f3d69accdd0e82a0a1a09ae75aff1d86c3d3c8

                            SHA512

                            993a9835af47242b47bf1aea2b6fabdfd3e098e7f3b3ad7e99cc317a06f77f18d5111ce099ac54e1702cdcc90c34ae85045cf15e9c35c67051a0625da6d1a33f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            4KB

                            MD5

                            fbda305235367dab99871ea5f0bd1cb4

                            SHA1

                            ade833eefcab1bf9d016b164c5efb3b97ca5767a

                            SHA256

                            7b0a662fa57a205371f6725876203d6a49ebc098cf511dcbceae43cd06d94b5f

                            SHA512

                            7608a8bda13849d93c36e57c77b3cc1430d2a9a3300da627352c09338ed5540493ad51c042c478a539c42ab07f250405eb850021f297576c8d6c7b68d41dd636

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            157KB

                            MD5

                            f640dbf57263f246ffb43579f3a7f271

                            SHA1

                            31abbc18956a61281e3724432ff56070e8b0da8c

                            SHA256

                            6dd5fef4e206fd38ce343afa5c094471b71be15d65fb8975eb8068b731cc839e

                            SHA512

                            73062b5060ab7cdbad81e069cd6d007470c811fc1ab6b30b7546953a3cdf6e3c024a98c1ba4362a05a09cc70f9419c0e6329f6dc90a65560f385171bf9827317

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                            Filesize

                            106KB

                            MD5

                            68ebd0ac3b555e6e78936b783f5a100a

                            SHA1

                            df2cd2f06c2403fec207e65294f9f0c8362a68ca

                            SHA256

                            c82ddaea1cb284e909d552e7292de0b0e8783efb43c03ad0386c4a0959f98733

                            SHA512

                            b0107ae84551dec8cb744985d4572c1ef7f8a2c3eed1be7896dc4a6f71195269226400f0dce9d4d19c80e6538741d5532b30589f37554d8bbe3e854da076b51a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57e08c.TMP

                            Filesize

                            103KB

                            MD5

                            b83d08b1ca46bcd4ea91d8727021e8e7

                            SHA1

                            e8909b0cf009d60410ef6028f074ec411745792e

                            SHA256

                            23a98c1c904f3ed231c0058a81cef2128c4263cc1a6037682532a1bea668772a

                            SHA512

                            b02acd951658d59084000f3a92e2368f752c4190f388996496236128e38f2c11a7d08e98e3f9ac5a3c779a8aed85a4e0dda266f5302f7cecfa1b613e77c4b983

                          • C:\Users\Admin\Downloads\disallowedcertstl.cab

                            Filesize

                            4KB

                            MD5

                            f7dcb24540769805e5bb30d193944dce

                            SHA1

                            e26c583c562293356794937d9e2e6155d15449ee

                            SHA256

                            6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                            SHA512

                            cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94