Analysis

  • max time kernel
    600s
  • max time network
    489s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2023, 10:51

General

  • Target

    https://saudileaks.org/

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://saudileaks.org/
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4e7d9758,0x7ffd4e7d9768,0x7ffd4e7d9778
      2⤵
        PID:3896
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:2
        2⤵
          PID:1988
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:8
          2⤵
            PID:3300
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:1
            2⤵
              PID:4168
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:1
              2⤵
                PID:400
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:8
                2⤵
                  PID:3640
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:8
                  2⤵
                    PID:1104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:8
                    2⤵
                      PID:4600
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2392 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3276
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:1668

                    Network

                          MITRE ATT&CK Matrix

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            288B

                            MD5

                            3b488ce2a6cee49f0e51ecb74c515610

                            SHA1

                            5aa1e7a975bd7eca077752d3ed9256941820a180

                            SHA256

                            ac996b8781ee079fc1f5725cd4b1de2ab251e6a2e18dd2db30e9803ae8ea8db6

                            SHA512

                            4776ffce7327e199e32afc23291c815f1d47e4552d0904f498a307a796f3e711c34e9d3b52294239e0fdcd1dba41399cadfcb7de2fd00c99462e8da150162ff6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            390e9d781db40c7171cd5a47963d992a

                            SHA1

                            38e1d28a0283edc19377297e5b26572c3110c81f

                            SHA256

                            2e500865aac15553f9b8635f2e41e39b6b52aef1a8550a9d9232dd8f4f59047f

                            SHA512

                            feea725044601be08be5f7bc0107880738acb783ece897d1e90102ae96b6ca503f301d12a03ef807b19b69f37c0045c08bdd16708516211c64d93988cbb06853

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            4dfd1419f84b8e50c3e2806c8a26b471

                            SHA1

                            e5b0932f65ee7db0e188099ba7a462e9f9844fe8

                            SHA256

                            4752bd4d0ccb6b28b324205c38a4261defd4e4889c5e3aafd4102190759f9719

                            SHA512

                            1ab8844d77d00126d06ebee49620af4fe35f02e0890a1e0c8ea76cf0d8a5f5b2570ab619fb88920614b1eef7d3a66c8ca7fdc2f3dc800e41c362de006c26e9bd

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            539B

                            MD5

                            febca11bc18fa8d775067a6b7ace887f

                            SHA1

                            08d793bf754d58b14f71b3402767a9798799616b

                            SHA256

                            eee28a9f2cc3bb3f089868497ef0158ab2a1b916ac435bfeacddba6ee70cb8e4

                            SHA512

                            6ab7ba5365e60ea511b424c616f047f353d7d026c4770a7a00f49ab20954d245c2e62b5dab5d3d983aa884db14fd66c1cc7ca99e24197b3d9aca1f6835576369

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            45533de1e7d41de55ffa6ba1aa390c33

                            SHA1

                            09a1a1a58a6445f8822857bb5196d2c688900082

                            SHA256

                            83d880ee5ee633741b2d851ca3d8bea01488d0225b4669fb8f7ad3c647f7cbeb

                            SHA512

                            66856977583097aeb079300f21c793b7f5adbae8dc69b3fdfe5385a8190c9f7a12005ebe975d0973630e6cde2a4983bb16cbd468ef2e70022b8bbd5b2c41d76a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            87KB

                            MD5

                            9cd8d9fef332ef1e6f08703b45967553

                            SHA1

                            c28be4a7b79d51908854f095321da48cb3ae8484

                            SHA256

                            9470b1d78e8ef078d1e9cf4e3a6a669920d22abaefbdc13789b11793c5ff2fe7

                            SHA512

                            e2cac0301410f40343e12fcb673c673133494b21e8b059981bc34251d7e479d3f621981c26a2cb1440055336778413a28d0b6fe43e7ed57e329c713e76ab9dee

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd