Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-09-2023 07:17

General

  • Target

    https://www.keyence.co.in/m/138200_2?mc=2&msid=1&mcid=18907676&alc=16839924&alv=3ca99017dc79be0f77cc1686183adaa9

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.keyence.co.in/m/138200_2?mc=2&msid=1&mcid=18907676&alc=16839924&alv=3ca99017dc79be0f77cc1686183adaa9
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa75ea9758,0x7ffa75ea9768,0x7ffa75ea9778
      2⤵
        PID:5080
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:2
        2⤵
          PID:4832
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:8
          2⤵
            PID:4304
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:8
            2⤵
              PID:852
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:1
              2⤵
                PID:3236
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:1
                2⤵
                  PID:4444
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4732 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:1
                  2⤵
                    PID:224
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4792 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:1
                    2⤵
                      PID:408
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5204 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:8
                      2⤵
                        PID:4736
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:8
                        2⤵
                          PID:2464
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:8
                          2⤵
                            PID:2164
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4508 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:856
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:528
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x2e0 0x4f8
                            1⤵
                              PID:3504

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              816B

                              MD5

                              8f8ca7d8f5ccdced5a283cac947e465a

                              SHA1

                              bf0f41042de88ea4195efc6ee7ff42c9987b0fe5

                              SHA256

                              7a56d138bb9f492f056631334296563dd2551dab45223f232369fa18f14cb324

                              SHA512

                              4afa0a7635acc2e855fb8423a361c917b0340dbe27bd3d167abc0844951c8508bf87b3e4b59b38024cbd8f6276fedce1bcdb89638a839bc25fba3e09fb8f8ea1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.keyence.co.in_0.indexeddb.leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              4KB

                              MD5

                              79bc475f7d7b8f16370f0a3edcb4c4f0

                              SHA1

                              5b1a4ca293cd57af38ce5478e2cdff39366944f0

                              SHA256

                              d59b73369fae94ba343d11bb74061c68b084d4a0e3913012c632923ba7a3c902

                              SHA512

                              54dd9ad8809f3aef5922f5706632b915c0eb38ae0a135385ea49ed7b49eb2d482d493487e540391f5ef22da1757eaf5e58e5cadbec1a9e83996ea92b9780569b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              3KB

                              MD5

                              bb036a875a4a47f94f1f8d4637d208d9

                              SHA1

                              c993edff3733365991af99bfb877d04bb2ab473c

                              SHA256

                              72787e2389fcad71639321e6b164363b0518c9c6f2c01bf9ca465aac6fb71cdc

                              SHA512

                              98fec8d3376ad4a2ef83779e827e3e0afb40f3709692b3e6e934e79bdce83bd16f55d5fbfabcc7a4c2a7b0bddbc757b94cdf97092ce57c6331617dc7b36a87bd

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              015e70b62ba88c8f6d64f872ebe69f82

                              SHA1

                              601024978e0bfe090b1f6d95cbf2b8802ab9a865

                              SHA256

                              0d4ef0989670d8435a0cc7af0012735eb5b2dafb0e8d561b778bd3afbf3936e2

                              SHA512

                              99d1927306f9d5f812436ee1704a3cccaa0b28cfa91f1154ad3d0571d7df0c383ff32f1cb987b9e3704e55ae8352634c38775bfc624480a74d1ee13fdd6443a8

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              a13c552f9e6567b2b37ab529232bab74

                              SHA1

                              022430e68044685427b50721d41d7d27353da024

                              SHA256

                              2ad34d23e9dafabd987b16d6db1b7d0bbae5775e6e313529daf40171a3b957c5

                              SHA512

                              d78fecdad26d822b13d48439397d27c963544e5d0b27cbd00c5e41eeeb75bb26778525500332d4dd9ca4f793a71dd724d80090c6bc261fb37239cd2d109eba02

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                              Filesize

                              72B

                              MD5

                              45a360c4ee6a1c8082c7dcdb6331685a

                              SHA1

                              939ca2290dc2155bcad4cea9bde7c919b72bd8fd

                              SHA256

                              9ef65a0888473ba4a00c2f6a9e61a76d5ababd990bf0ef91b9f24ff005cabdea

                              SHA512

                              16646cfef7641c2c8b50b33164e4fa8d2e045dd42aef12dbc92e0956ca6d6292e65a82115d49b545fbf2f3209139fe1adb1ea3f3930fb5cf424aeee47e522882

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57eb69.TMP

                              Filesize

                              48B

                              MD5

                              d1baadd5093b80f8618ddf32cdcb12e3

                              SHA1

                              239095c8e8e3c053eb3df268ae4b2bd54e389bab

                              SHA256

                              443e1c98b0533d26bf86edacd3a8bd1afe83de6cb845efd881a51d0df87e709c

                              SHA512

                              8d3c5aa9beffcb3c434a0e824046ec4845e29635ccda94bf892a0a4ba163397837bc52bcd71d09415d265bb493c82da65bfb1824e4030aa6ac2103b5c507cd4f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              97KB

                              MD5

                              1933a488fe5c57eb7e7a28986788a909

                              SHA1

                              fa8c790936c366783a04110bf565cf003c4d0b4a

                              SHA256

                              bcb64b75d4af05b94b0e5b0926324749f4af3b29c0475e88212d33cbf5ddfcc8

                              SHA512

                              39f4249df2dc7a98dc2943e07b6a0d248e11d40763b4605bbfc82c4e0eff564b7a630aa5b8cfd270d19be070cea597b3aa05656e4dac9445a6a86ac03f4dc93f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd