Analysis

  • max time kernel
    251s
  • max time network
    252s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-es
  • resource tags

    arch:x64arch:x86image:win10-20230703-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    20/07/2023, 12:17

General

  • Target

    https://cdn.discordapp.com/attachments/1091442373747294208/1105586374624677908/SMM_WE_4.0.0_Beta_PC.zip

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1091442373747294208/1105586374624677908/SMM_WE_4.0.0_Beta_PC.zip
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbfdad9758,0x7ffbfdad9768,0x7ffbfdad9778
      2⤵
        PID:2884
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:2
        2⤵
          PID:312
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:8
          2⤵
            PID:660
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:8
            2⤵
              PID:4388
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:1
              2⤵
                PID:2228
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:1
                2⤵
                  PID:3236
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:8
                  2⤵
                    PID:3352
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:8
                    2⤵
                      PID:2892
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:8
                      2⤵
                        PID:2236
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:8
                        2⤵
                          PID:3872
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3760
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3760
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:4992
                          • C:\Program Files\7-Zip\7zG.exe
                            "C:\Program Files\7-Zip\7zG.exe" t -an -ai#7zMap24777:126:7zEvent31829
                            1⤵
                            • Suspicious use of FindShellTrayWindow
                            PID:4832
                          • C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe
                            "C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe"
                            1⤵
                            • Drops file in Windows directory
                            • Modifies registry class
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:4312
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x2d0
                            1⤵
                              PID:4052
                            • C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe
                              "C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe"
                              1⤵
                              • Modifies registry class
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              PID:3952

                            Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    40331372dd99cbbc47adbc5892da7eca

                                    SHA1

                                    66c1571dd27fdb013d676d944b2b771317f15caf

                                    SHA256

                                    88e38aae0080a05af7142fb04028077f26c4ae790fcbd85035697a843f84c117

                                    SHA512

                                    02b322f1c01a11303b76317521bc4729c6496e26519a76851091e2103a9242576c69d9889e2129f7e7b1d483600134723528d0ea2d25cceb5b083e7aa3c68c9a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    94dca48e60d13128e088187173178a8d

                                    SHA1

                                    0f590be28cf139f10a60a166ac28830e229d4059

                                    SHA256

                                    3fcf9d63df57052e7aa190300f52f7cb9cee0f3c626ac18218023c742acbc76f

                                    SHA512

                                    7642b1820a80622bf6a1187339149891bec023f018b6b46372731c7286dd51ea809c259c487997fcb0acac86b9534d4f2bf83179e0eabe60b3c10004279c953d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    6780b06bafa646cd250f24808c164a8b

                                    SHA1

                                    8220131bf4bc6b2e51b807302ea6194cfd6d12be

                                    SHA256

                                    40395e811bd7df4db29e00ec78d12adb64dfdab0ab7eea45603afd2f1051ac46

                                    SHA512

                                    8a1b643704b4fc3915e79d1ff5381885ebc8cedcfafa1ee91f0376de9d9ea0459faee0afb524f5409d1c33493f10d643d4d1a4d0917214a7179ac31cfdf72bf3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    69b9ba7fa0da454346404b42609f6712

                                    SHA1

                                    acfa48140e65a5afec124c4b0673b9537fd9624e

                                    SHA256

                                    9544ffac3c41190827b913d884024acf509fa08b15af8800445ecc3838781cef

                                    SHA512

                                    90e9202a2669383d9973ab396f88073a10496062390cac6f0cd09f3fd6fc905e435f43f18f0de3833b0f66bdaa4db5ab968e64038c8b78577f879941b1cd3562

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    b96a3e63a2d3a74bc62adbe97dedf57b

                                    SHA1

                                    3c5465168a26dd0208f834621f8540b4367a0334

                                    SHA256

                                    1a5171307bdb2af091feb5f74737082fe8584760064742a7851ef944b0338b89

                                    SHA512

                                    49d60a509232cfed7fbcb1d8fe4af02ea457881e7694b5ca848af83591bcf2c98d1619a3c00a7252d246b1725509d1dcb64c0010dbb4e7526b3b748c5c538445

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    a5372796af8dc577159fcc279e8ec081

                                    SHA1

                                    291aa289118d2f8af33de2ecd44966a73486ad19

                                    SHA256

                                    87f66c83d4c39abf81015d57e4b213ccf7ee829a532c257358cde4231e1fd1c8

                                    SHA512

                                    3dc220f9d2c260f800c73b0fbdb0f6832284efc4250fc0151a1633c3128bb0acb775d9257d5d1532cc7ccfc0778e4bbb611386c858d2dbf268c6ae63a7208722

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    85e7f861aee95c3c8cf9891a4c6ee5c6

                                    SHA1

                                    5153a5b978ffe07673ec657e166087db32781063

                                    SHA256

                                    31b3aef0cbc19a6e6df914f94c054025c44cea3331894abab52d4fd0fe7a5026

                                    SHA512

                                    6f18132aebc6f29840826628a27ce9212763bb9149417798951a3f52d09ca2c7b071cee52823b6500819381ef45cd1627fda0980b2dd3174d6636161313abb79

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    87KB

                                    MD5

                                    2aec43e80fbb0b5c3f2111482a4c611b

                                    SHA1

                                    5ca324c015a2619ece6df11be9015adfb9481b52

                                    SHA256

                                    13fe5185c9564e934541534c947ad371baaf7a99bb637125667983207250881b

                                    SHA512

                                    fe339c1304722f7e5fe93932ff14116b170deeae091cbf6c442d438ab3e6f02d138d70236548ea949e48d5e4e3e3af1ee6293783d7948d035fb37c3713fb9462

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                    Filesize

                                    105KB

                                    MD5

                                    08f89e4aeb2e7f9407a45bff5a8f249a

                                    SHA1

                                    95a201f8f455132bba290ce2513d572c2fbd636c

                                    SHA256

                                    af21c598d35144b3590ff9b015f98fdfe777cf6be1360a339f0efcaaaeb7dde8

                                    SHA512

                                    96f0194f55bcfea8dfc7d0fbb451cc3224eb8ae86bc16763da863a51450b022a0fcb15c1c2ff66be820963ac36dafee0e48a0ca055e40e21b747638b78d87647

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5810a5.TMP

                                    Filesize

                                    102KB

                                    MD5

                                    31f000b671d62229c45e5ea7c89cf541

                                    SHA1

                                    328b4b0992aad00ad9b97fa5bfff6f75059680d6

                                    SHA256

                                    ae3784cdb6411baaaa199f89ffdd114f8922cd2d1d14aed94cd8aa849f32fc62

                                    SHA512

                                    8163ce4f07b342c9ea6dc2c663e235b63204e28e66de48c2d0c44f3e7b5eef875012f7f42626ea8ca4a8c565f613c601ac2517429120a9bcd540ae236c576d04

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                    Filesize

                                    2B

                                    MD5

                                    99914b932bd37a50b983c5e7c90ae93b

                                    SHA1

                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                    SHA256

                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                    SHA512

                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                  • C:\Users\Admin\AppData\Local\SMM_WE\Settings.dat

                                    Filesize

                                    72B

                                    MD5

                                    a2567f3687aaef1777b55c519935b9df

                                    SHA1

                                    efe71f441b81406f8696fa963cd33f3d42bf8cb7

                                    SHA256

                                    ccd486102a58b0bd1fc39c21173241899a303e15dfc487cec6dbd4566148b73e

                                    SHA512

                                    6a972973da560bccadfa11ce7fd4b9debe794ec0884a85e07cb5b806665d4f3ae80fb19bbe0a301ed89b52501d98516df010ca9206470c6f51bd4ba5a9e567f5

                                  • C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC.zip

                                    Filesize

                                    141.8MB

                                    MD5

                                    da4bc8264b1994f44082416db1df74af

                                    SHA1

                                    cc577ece22ec093c47ecf2a1506e56f859e0d6ad

                                    SHA256

                                    a19b1dce0887f204dce9fdaad9220fedfcdf1e39b5b9d07a8ee9e277ae47cb38

                                    SHA512

                                    7275b1047ac463ec885d4b101072bff9833c17730f60dd6c863e36eab81b4ead397773bdec3545bab8e8a85dd2dbe685dd6ddd23e2c54ff8db18f68b22f49f57

                                  • C:\Windows\INF\msmouse.PNF

                                    Filesize

                                    94KB

                                    MD5

                                    b88d3cab65777afdf9d9c7b8cb190cea

                                    SHA1

                                    435ef6f0ec97f975660b72626a5df4fcd523d47e

                                    SHA256

                                    9001f3496061971ea79442afd59925ddba3ede734cbb6fa10970d510e547b707

                                    SHA512

                                    f8983babc6158fad96d0c30e2c476e562e50e4e34ed890e1eea9f4a6d17b044349a7a1ddc0f993068ccd3f75ec614ec7796883616010a73e30728c012b1b686f

                                  • memory/3952-251-0x0000000067700000-0x00000000677E4000-memory.dmp

                                    Filesize

                                    912KB

                                  • memory/3952-253-0x0000000067700000-0x00000000677E4000-memory.dmp

                                    Filesize

                                    912KB

                                  • memory/4312-250-0x0000000067700000-0x00000000677E4000-memory.dmp

                                    Filesize

                                    912KB