Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 08:49

General

  • Target

    2018eba1265ba7b87a8816bf88c716de475681e756a9f668d40c839c601edeb0.exe

  • Size

    4.2MB

  • MD5

    354e9fd69f1cd472cba6d42f8b6ca551

  • SHA1

    fcf3b745a984896f3edcc279f4a117cfa1ab1f9f

  • SHA256

    2018eba1265ba7b87a8816bf88c716de475681e756a9f668d40c839c601edeb0

  • SHA512

    5c35d777ba75f5763e668abf44f153503a2e7cf2b42d2a9cad3bb549532f44ef0aa981f5611aaaf3c3a22e06eb0a0a7e20b3fdc02c459a575ded921121202c8b

  • SSDEEP

    98304:ku0k2zind6CFYgFLcdjHKYqdwkLcHHzJBAUZLJ:kUMqjAzJV9

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2018eba1265ba7b87a8816bf88c716de475681e756a9f668d40c839c601edeb0.exe
    "C:\Users\Admin\AppData\Local\Temp\2018eba1265ba7b87a8816bf88c716de475681e756a9f668d40c839c601edeb0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\sc.exe
        sc delete ChromeElevationService
        3⤵
        • Launches sc.exe
        PID:4508
      • C:\Windows\SysWOW64\sc.exe
        sc delete 360
        3⤵
        • Launches sc.exe
        PID:1612
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /t /im dllhost.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2908
      • C:\Windows\SysWOW64\reg.exe
        REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\360 /f
        3⤵
          PID:1100
        • C:\Windows\SysWOW64\reg.exe
          REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\360 /f
          3⤵
            PID:3912
          • C:\Windows\SysWOW64\reg.exe
            REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\Services\360 /f
            3⤵
              PID:4528
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://zcmao.lanzouh.com/iuwrl15yeryb
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93f9646f8,0x7ff93f964708,0x7ff93f964718
              3⤵
                PID:1420
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4348
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
                3⤵
                  PID:3664
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:8
                  3⤵
                    PID:3308
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                    3⤵
                      PID:1540
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                      3⤵
                        PID:560
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:8
                        3⤵
                          PID:3336
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1484
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                          3⤵
                            PID:4764
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:1
                            3⤵
                              PID:4328
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                              3⤵
                                PID:2056
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                                3⤵
                                  PID:3948
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,5082979530022317847,5734786303964933866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1100
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2840
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2388

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  3423d7e71b832850019e032730997f69

                                  SHA1

                                  bbc91ba3960fb8f7f2d5a190e6585010675d9061

                                  SHA256

                                  53770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649

                                  SHA512

                                  03d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  120B

                                  MD5

                                  c9ee724f349a166576dce963a941b61f

                                  SHA1

                                  94c04a26fe54476e7fd4fdb801757fbe3040f155

                                  SHA256

                                  1618ff435092cba565346332c79051a7f636442214d56c8a1d73452ec2966224

                                  SHA512

                                  9344bc873657d06bd609b32601a37dadd75c8ae92e87d08e1298490dc7f0a9d66a7736a5cefd1e5626e48e6cc24ca7e7cd160638979d5c334c05b804539a1fab

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  182B

                                  MD5

                                  2a34e3b0cb9618524ad550fde8717ef6

                                  SHA1

                                  a3868e26390a7448be6f2f9507bb5012f604517e

                                  SHA256

                                  869ef21fe529217d02556f8e6a5b3387a3d8c785809d7d52fecc7c8cf1795dbb

                                  SHA512

                                  7fa1168b89b26751123d36e1456e102b77a5532e036a6ec09a1186ab9c6a21f8a3cbbbf6a3fa3fa730af59f2a8eb265a4a5dcb5547a3e56d4d2ea86257ddadcb

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  111B

                                  MD5

                                  807419ca9a4734feaf8d8563a003b048

                                  SHA1

                                  a723c7d60a65886ffa068711f1e900ccc85922a6

                                  SHA256

                                  aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                  SHA512

                                  f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  704eaac957c26033471f063d765157a8

                                  SHA1

                                  9a56af46553033fd3ac8372c2e1bbddde3ea73c0

                                  SHA256

                                  ea2345fe2a72dd95c06ecd9f8a588d3362c9ff443282bf0be843b261220f8965

                                  SHA512

                                  60052ba67eff89f34f21f1a8aacf26fb7d0994795f03d5de8a14bd550253580a005aec8dd68d10749b95185b6341b5703d18287c312528a0044f559e06a76a10

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  7694e998f432ac8f5f60bc45e6d7c9d0

                                  SHA1

                                  289378f5d9af013b65c65c227ba1e88c907629e0

                                  SHA256

                                  d946de0b7af97df2085304093c535b3bf0a9098c6795cf15120fb9470c1f0990

                                  SHA512

                                  a1c6c29039f518e9adfb3cdc2a64949c804564e59279d25940fdc5b42ef2edd5f0bd4b03382bcc6e4b6fc81938ffacfb85c58f2c6f0647a90dd45c848db61f8a

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                  Filesize

                                  24KB

                                  MD5

                                  0e78f9a3ece93ae9434c64ea2bff51dc

                                  SHA1

                                  a0e4c75fe32417fe2df705987df5817326e1b3b9

                                  SHA256

                                  5c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68

                                  SHA512

                                  9d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  7119eaa4317f5b4c0fdb252239b87e99

                                  SHA1

                                  3dc8f9fd82e967ca438899eb4d972fe5350da5e6

                                  SHA256

                                  980b149b3a3131795fe30df3af3fd1a98e632d08a326ac871c40e5739fb4b12d

                                  SHA512

                                  b89d2523dcf4c5b1922f669027c06e011a8a94da96ebd4ebeb9792b231100cceef8fbf7a648aa767d7021608ea48a672060915c651881dbb3ddb66392e7ba986

                                • C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat

                                  Filesize

                                  467B

                                  MD5

                                  f3ff51b7aa0e4e3044d31e57cd316f38

                                  SHA1

                                  de03393bddc8e3cc225766e988ec732a86be9674

                                  SHA256

                                  ea04a3da71be52f51404cabfa8eeefd12223d95f92c1f2a376ee25ee7323181b

                                  SHA512

                                  c582a9767528a4dc860ba322529b4d2b77aa8a272bb95053ace7fba671aad0aefc9aa7c7fd5682b8f875da58a4b6142ec708cb4bc40345645cc661c12ab32f21

                                • memory/5056-0-0x0000000002840000-0x000000000284A000-memory.dmp

                                  Filesize

                                  40KB