Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2023, 23:13

General

  • Target

    https://cdn.discordapp.com/attachments/1132044628447731783/1132450393696260116/-_.rar

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1132044628447731783/1132450393696260116/-_.rar
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e8d9758,0x7ffd5e8d9768,0x7ffd5e8d9778
      2⤵
        PID:3664
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:2
        2⤵
          PID:2572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:8
          2⤵
            PID:3648
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:8
            2⤵
              PID:4140
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:1
              2⤵
                PID:4248
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:1
                2⤵
                  PID:812
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:8
                  2⤵
                    PID:3420
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:8
                    2⤵
                      PID:3880
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1892,i,1627323460545708995,13932127910398096379,131072 /prefetch:8
                      2⤵
                        PID:2276
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:316
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of SetWindowsHookEx
                        PID:3932
                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\-_.rar"
                          2⤵
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of SetWindowsHookEx
                          PID:4372
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4756
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\-_\" -ad -an -ai#7zMap22806:62:7zEvent1743
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:448
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap13563:62:7zEvent2478
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:2368
                        • C:\Program Files\7-Zip\7zFM.exe
                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\-_.rar"
                          1⤵
                          • Modifies registry class
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:4876

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          265c4b2fc856076cc9ef4b4f619c49e4

                          SHA1

                          8b148befc3aaa1b866565eebda189ee3159d08fd

                          SHA256

                          098df8bf975e197cfdb0d65be69f7fdf66faed29538a5558e0f562f55600c90f

                          SHA512

                          676bb0d12136a453aad552c6098b102541fe51ce92e9353708c06c7d8eafbff53b756c09641223bcf0479e62e9fe0511c2b3d9881d00bf64aef8ceb5a914e6cb

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          556c0854ace7c2e8fa0fd48f9ca6eae3

                          SHA1

                          d41e60293a5a027b1d2bdda4184b6d007485568a

                          SHA256

                          c8a69d121d4e293a4a4f14e5cbe0c40378a2229bb7398a89a82e5b9061e45f3b

                          SHA512

                          e9b241628bf8a4c8c37135ed0cc8d7310b30edfc931b3c2f5047013f31ac77d715cd05a8276138cea9c65e13a7ff07f352d61d248e560d12a5b20ca25efc12d0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          87KB

                          MD5

                          50dfb0a2a0d19b460983a291034062f7

                          SHA1

                          ea3448b530a2908280f39e3ae3b8707c61393de4

                          SHA256

                          71e97c25eb47356ee551c71949108e334ad834d82b85e0c86526fd9c8bb075d8

                          SHA512

                          36b68e79bc41e7b36230c7d1ee7b3836528bfe46d7e437fd73cab2c067eca195314c50abc9e6b01d372f25468450fafd8b7057ed8631e8c06ca3735124dd4507

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                        • C:\Users\Admin\AppData\Local\Temp\7zOC03BD3C8\‏‏ي - اختصار.lnk

                          Filesize

                          721B

                          MD5

                          dfe098afaaf3952b83f7f6f0111a8488

                          SHA1

                          fc7475fef2f4fe927ec19e73301aff1a3b60dd23

                          SHA256

                          b06dcfe3e28bd9ddc0075a6005658d2bc4e8f2cbecf52a04aecb0264d48818d2

                          SHA512

                          53248ef29b9a6237be52bb24249966e05805976f51e9daace6b0ab389993addac0e0b8d109c2a2b7334c01f7ed28bccb5ef7b99b27afa6952a2f4b313e550029

                        • C:\Users\Admin\Downloads\-_.rar

                          Filesize

                          619B

                          MD5

                          6a3a6a2080ae16b1d2426161eef92e3b

                          SHA1

                          a37ffb3db9e87362d92667adccd1d199ed20deed

                          SHA256

                          6a4d785fb82488b372653432da5ee505b013eea59ae4f88e779236cd34e0785c

                          SHA512

                          f530b6e7692b41d711b02cec99ea999486cfde19f97592da436b2384d01a3a5d275efc29b6b2fb74ed1dc8bb82e457ea27a7990484e55fe0c207e831c70bb24e

                        • memory/4372-235-0x00007FF653080000-0x00007FF653178000-memory.dmp

                          Filesize

                          992KB

                        • memory/4372-236-0x00007FFD4F2A0000-0x00007FFD4F2D4000-memory.dmp

                          Filesize

                          208KB

                        • memory/4372-237-0x00007FFD4EFE0000-0x00007FFD4F294000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4372-238-0x00007FFD55C60000-0x00007FFD55C78000-memory.dmp

                          Filesize

                          96KB

                        • memory/4372-239-0x00007FFD55200000-0x00007FFD55217000-memory.dmp

                          Filesize

                          92KB

                        • memory/4372-241-0x00007FFD4FB60000-0x00007FFD4FB77000-memory.dmp

                          Filesize

                          92KB

                        • memory/4372-240-0x00007FFD50010000-0x00007FFD50021000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-243-0x00007FFD4F700000-0x00007FFD4F71D000-memory.dmp

                          Filesize

                          116KB

                        • memory/4372-244-0x00007FFD4F6E0000-0x00007FFD4F6F1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-242-0x00007FFD4F720000-0x00007FFD4F731000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-245-0x00007FFD4E5A0000-0x00007FFD4E7A0000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/4372-246-0x00007FFD4D4F0000-0x00007FFD4E59B000-memory.dmp

                          Filesize

                          16.7MB

                        • memory/4372-247-0x00007FFD4F6A0000-0x00007FFD4F6DF000-memory.dmp

                          Filesize

                          252KB

                        • memory/4372-248-0x00007FFD4F670000-0x00007FFD4F691000-memory.dmp

                          Filesize

                          132KB

                        • memory/4372-249-0x00007FFD4F650000-0x00007FFD4F668000-memory.dmp

                          Filesize

                          96KB

                        • memory/4372-251-0x00007FFD4D4D0000-0x00007FFD4D4E1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-250-0x00007FFD4F630000-0x00007FFD4F641000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-252-0x00007FFD4D4B0000-0x00007FFD4D4C1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-253-0x00007FFD4D490000-0x00007FFD4D4AB000-memory.dmp

                          Filesize

                          108KB

                        • memory/4372-254-0x00007FFD4D470000-0x00007FFD4D481000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-255-0x00007FFD4D450000-0x00007FFD4D468000-memory.dmp

                          Filesize

                          96KB

                        • memory/4372-256-0x00007FFD4D420000-0x00007FFD4D450000-memory.dmp

                          Filesize

                          192KB

                        • memory/4372-257-0x00007FFD4CB80000-0x00007FFD4CBE7000-memory.dmp

                          Filesize

                          412KB

                        • memory/4372-259-0x00007FFD4D400000-0x00007FFD4D411000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-258-0x00007FFD4CB10000-0x00007FFD4CB7F000-memory.dmp

                          Filesize

                          444KB

                        • memory/4372-261-0x00007FFD4CA80000-0x00007FFD4CAA8000-memory.dmp

                          Filesize

                          160KB

                        • memory/4372-260-0x00007FFD4CAB0000-0x00007FFD4CB06000-memory.dmp

                          Filesize

                          344KB

                        • memory/4372-262-0x00007FFD4BDA0000-0x00007FFD4BDC4000-memory.dmp

                          Filesize

                          144KB

                        • memory/4372-263-0x00007FFD4BD80000-0x00007FFD4BD97000-memory.dmp

                          Filesize

                          92KB

                        • memory/4372-264-0x00007FFD4BD50000-0x00007FFD4BD73000-memory.dmp

                          Filesize

                          140KB

                        • memory/4372-265-0x00007FFD4BD30000-0x00007FFD4BD41000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-266-0x00007FFD4BD10000-0x00007FFD4BD22000-memory.dmp

                          Filesize

                          72KB

                        • memory/4372-267-0x00007FFD4BCE0000-0x00007FFD4BD01000-memory.dmp

                          Filesize

                          132KB

                        • memory/4372-268-0x00007FFD4BAA0000-0x00007FFD4BAB3000-memory.dmp

                          Filesize

                          76KB

                        • memory/4372-270-0x00007FFD4B940000-0x00007FFD4BA7B000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/4372-269-0x00007FFD4BA80000-0x00007FFD4BA92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4372-271-0x00007FFD4B910000-0x00007FFD4B93C000-memory.dmp

                          Filesize

                          176KB

                        • memory/4372-272-0x00007FFD4B750000-0x00007FFD4B902000-memory.dmp

                          Filesize

                          1.7MB

                        • memory/4372-273-0x00007FFD4B6F0000-0x00007FFD4B74C000-memory.dmp

                          Filesize

                          368KB

                        • memory/4372-274-0x00007FFD4B6D0000-0x00007FFD4B6E1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-275-0x00007FFD4B630000-0x00007FFD4B6C7000-memory.dmp

                          Filesize

                          604KB

                        • memory/4372-276-0x00007FFD4B610000-0x00007FFD4B622000-memory.dmp

                          Filesize

                          72KB

                        • memory/4372-277-0x00007FFD4B3D0000-0x00007FFD4B601000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/4372-278-0x00007FFD4B2B0000-0x00007FFD4B3C2000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4372-279-0x00007FFD4B270000-0x00007FFD4B2A5000-memory.dmp

                          Filesize

                          212KB

                        • memory/4372-280-0x00007FFD4B240000-0x00007FFD4B265000-memory.dmp

                          Filesize

                          148KB

                        • memory/4372-281-0x00007FFD4B220000-0x00007FFD4B231000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-282-0x00007FFD4B1B0000-0x00007FFD4B211000-memory.dmp

                          Filesize

                          388KB

                        • memory/4372-284-0x00007FFD4B170000-0x00007FFD4B182000-memory.dmp

                          Filesize

                          72KB

                        • memory/4372-283-0x00007FFD4B190000-0x00007FFD4B1A1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-285-0x00007FFD4B150000-0x00007FFD4B163000-memory.dmp

                          Filesize

                          76KB

                        • memory/4372-286-0x00007FFD4B0B0000-0x00007FFD4B14F000-memory.dmp

                          Filesize

                          636KB

                        • memory/4372-287-0x00007FFD4B090000-0x00007FFD4B0A1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-288-0x00007FFD4AF80000-0x00007FFD4B082000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4372-289-0x00007FFD4AF60000-0x00007FFD4AF71000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-290-0x00007FFD4AF40000-0x00007FFD4AF51000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-297-0x00007FFD4AF00000-0x00007FFD4AF12000-memory.dmp

                          Filesize

                          72KB

                        • memory/4372-296-0x00007FFD4AF20000-0x00007FFD4AF31000-memory.dmp

                          Filesize

                          68KB

                        • memory/4372-299-0x00007FFD4AEC0000-0x00007FFD4AED6000-memory.dmp

                          Filesize

                          88KB

                        • memory/4372-298-0x00007FFD4AEE0000-0x00007FFD4AEF8000-memory.dmp

                          Filesize

                          96KB

                        • memory/4372-300-0x00007FFD4AE90000-0x00007FFD4AEB9000-memory.dmp

                          Filesize

                          164KB

                        • memory/4372-305-0x00007FF653080000-0x00007FF653178000-memory.dmp

                          Filesize

                          992KB

                        • memory/4372-307-0x00007FFD4F2A0000-0x00007FFD4F2D4000-memory.dmp

                          Filesize

                          208KB

                        • memory/4372-309-0x00007FFD4EFE0000-0x00007FFD4F294000-memory.dmp

                          Filesize

                          2.7MB