Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2023, 23:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1132044628447731783/1132450393696260116/-_.rar
Resource
win10v2004-20230703-en
General
-
Target
https://cdn.discordapp.com/attachments/1132044628447731783/1132450393696260116/-_.rar
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133345412355799939" chrome.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.rar OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 7zFM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 7zFM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff 7zFM.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4372 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3932 OpenWith.exe 4372 vlc.exe 4876 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeRestorePrivilege 448 7zG.exe Token: 35 448 7zG.exe Token: SeSecurityPrivilege 448 7zG.exe Token: SeRestorePrivilege 2368 7zG.exe Token: 35 2368 7zG.exe Token: SeSecurityPrivilege 2368 7zG.exe Token: SeSecurityPrivilege 2368 7zG.exe Token: SeRestorePrivilege 4876 7zFM.exe Token: 35 4876 7zFM.exe Token: SeSecurityPrivilege 4876 7zFM.exe Token: SeSecurityPrivilege 4876 7zFM.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 4372 vlc.exe 4372 vlc.exe 4372 vlc.exe 4372 vlc.exe 448 7zG.exe 2368 7zG.exe 4876 7zFM.exe 4876 7zFM.exe 4876 7zFM.exe 4876 7zFM.exe 4876 7zFM.exe 4876 7zFM.exe 4876 7zFM.exe 4876 7zFM.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 4372 vlc.exe 4372 vlc.exe 4372 vlc.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 3932 OpenWith.exe 4372 vlc.exe 4876 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 3664 1848 chrome.exe 38 PID 1848 wrote to memory of 3664 1848 chrome.exe 38 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 2572 1848 chrome.exe 87 PID 1848 wrote to memory of 3648 1848 chrome.exe 88 PID 1848 wrote to memory of 3648 1848 chrome.exe 88 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89 PID 1848 wrote to memory of 4140 1848 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1132044628447731783/1132450393696260116/-_.rar1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e8d9758,0x7ffd5e8d9768,0x7ffd5e8d97782⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:22⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:12⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:316
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\-_.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4756
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\-_\" -ad -an -ai#7zMap22806:62:7zEvent17431⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:448
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap13563:62:7zEvent24781⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2368
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\-_.rar"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5265c4b2fc856076cc9ef4b4f619c49e4
SHA18b148befc3aaa1b866565eebda189ee3159d08fd
SHA256098df8bf975e197cfdb0d65be69f7fdf66faed29538a5558e0f562f55600c90f
SHA512676bb0d12136a453aad552c6098b102541fe51ce92e9353708c06c7d8eafbff53b756c09641223bcf0479e62e9fe0511c2b3d9881d00bf64aef8ceb5a914e6cb
-
Filesize
6KB
MD5556c0854ace7c2e8fa0fd48f9ca6eae3
SHA1d41e60293a5a027b1d2bdda4184b6d007485568a
SHA256c8a69d121d4e293a4a4f14e5cbe0c40378a2229bb7398a89a82e5b9061e45f3b
SHA512e9b241628bf8a4c8c37135ed0cc8d7310b30edfc931b3c2f5047013f31ac77d715cd05a8276138cea9c65e13a7ff07f352d61d248e560d12a5b20ca25efc12d0
-
Filesize
87KB
MD550dfb0a2a0d19b460983a291034062f7
SHA1ea3448b530a2908280f39e3ae3b8707c61393de4
SHA25671e97c25eb47356ee551c71949108e334ad834d82b85e0c86526fd9c8bb075d8
SHA51236b68e79bc41e7b36230c7d1ee7b3836528bfe46d7e437fd73cab2c067eca195314c50abc9e6b01d372f25468450fafd8b7057ed8631e8c06ca3735124dd4507
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
721B
MD5dfe098afaaf3952b83f7f6f0111a8488
SHA1fc7475fef2f4fe927ec19e73301aff1a3b60dd23
SHA256b06dcfe3e28bd9ddc0075a6005658d2bc4e8f2cbecf52a04aecb0264d48818d2
SHA51253248ef29b9a6237be52bb24249966e05805976f51e9daace6b0ab389993addac0e0b8d109c2a2b7334c01f7ed28bccb5ef7b99b27afa6952a2f4b313e550029
-
Filesize
619B
MD56a3a6a2080ae16b1d2426161eef92e3b
SHA1a37ffb3db9e87362d92667adccd1d199ed20deed
SHA2566a4d785fb82488b372653432da5ee505b013eea59ae4f88e779236cd34e0785c
SHA512f530b6e7692b41d711b02cec99ea999486cfde19f97592da436b2384d01a3a5d275efc29b6b2fb74ed1dc8bb82e457ea27a7990484e55fe0c207e831c70bb24e