Analysis

  • max time kernel
    302s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2023, 18:59

General

  • Target

    https://groups.google.com/d/optout

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://groups.google.com/d/optout
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe78fc9758,0x7ffe78fc9768,0x7ffe78fc9778
      2⤵
        PID:352
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:2
        2⤵
          PID:4332
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:8
          2⤵
            PID:1020
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:8
            2⤵
              PID:2160
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:1
              2⤵
                PID:4504
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:1
                2⤵
                  PID:212
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:1
                  2⤵
                    PID:3904
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4908 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:1
                    2⤵
                      PID:3196
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3164 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:8
                      2⤵
                      • Modifies registry class
                      PID:4492
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4920 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:8
                      2⤵
                        PID:928
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:8
                        2⤵
                          PID:2468
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:8
                          2⤵
                            PID:640
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2512 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4240
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:4196
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                            1⤵
                              PID:3376
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                              1⤵
                                PID:1568

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      312B

                                      MD5

                                      5d36d01394d85615eb870bd0683c729b

                                      SHA1

                                      487f1a10702c9b357f9233e74029b0bc735f8f53

                                      SHA256

                                      8da85defdbbece4760e9369cd3229c93964b4faa87673e500834d9da3588e422

                                      SHA512

                                      4a819acc8cc765dca86c2266537158d9731f7ef0eaecc8108be0d2d328d0f6c8b23aa26a52c56bff57825a6639a220e4472f03eb6657ffe73845b3c2d3d46154

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      2KB

                                      MD5

                                      32d198944c11c75415a6b8d9df3b4930

                                      SHA1

                                      537fcfb61083b868f120601e980663d39214ac31

                                      SHA256

                                      061462ef6035c4470bf29b3e90237210bb69348cb2920cd7d5d2330bc5f9e813

                                      SHA512

                                      1edb3dc55fe7156fee37ec673549b2ef33dceb6ece6d9579f76a2727d095f1e67e086b2aa9ede0eba460d1c20c970fa47044252ce245d25e5a17f2fe85dba9be

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      2KB

                                      MD5

                                      5e1b108d3801807f58d6b6def6965d0b

                                      SHA1

                                      ef0d80755b1a378bf6a0d98bfc9412d75456354a

                                      SHA256

                                      2129d5d654d506b87ea65a0cc5a7a68d2c6e1e28956ee0b16724ce2f2c04b542

                                      SHA512

                                      5157451b771415f78a9c9ca668804cfbab20e911e904699d6ba2ef9e91cec6522a79c6ef4fa5b591d24ecf6399be3156608132066a4d59e90dd457ab9a75eca4

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      371B

                                      MD5

                                      d9a5f387d893db2256166ad4a31966f8

                                      SHA1

                                      08bc74df5f7b6b3a893f97dfb0c5e78626e913ff

                                      SHA256

                                      778b562d7f830eb6b404709781405ef7f29438a0f68891dfdca5784403be8b4e

                                      SHA512

                                      068098a9b8dfe406b4309159bf5405cb30f1c61a9dd17fe6f213cd1c9faa373a533705c211b8d6eab5b3f369820f4e51134dcb71d1f9ae4927417da9653c8074

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      371B

                                      MD5

                                      843ce22a6713185ee67401758cca4fe1

                                      SHA1

                                      90f4d8ebdb68c49c9eca6a4b5136e8b2d8da58a0

                                      SHA256

                                      83900e37e4eccad3f0f540ecd11ff252833673a2febeabd3ecfac77ddea4aa95

                                      SHA512

                                      6598ad739c7ad01986cef528b1973be42eea3cff9b183280dfd3656fec073607609d709ad5530cb1e58cab751ef5165f119dbf98187b11bde542c5260682be0c

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      eeded419c2a23f1064a2bd0e80ea5426

                                      SHA1

                                      b85588703f1cdd2bb4713cd0fa8bf35aa5b7d327

                                      SHA256

                                      beed001bfc3920e25545afd6971562bcaef349be5659413c3f31120f27c9de88

                                      SHA512

                                      55581b18fcbbeb5c06969e11380565652286dd7da8ac69c8d6ca19c865002d5436ebea1239892ad054550b8276f60ef3076c4cfd5c3c5117949d41ab2155c553

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      101KB

                                      MD5

                                      b5ac8d81042dc8c2b035508f19e4c046

                                      SHA1

                                      fd816fefe09d0ab3ab9a68300b26030a154b8bb3

                                      SHA256

                                      33fecf55a633fea8c1919af26f027c17ef9a2e736c8e9a99322ced952a517ce1

                                      SHA512

                                      b9c3c882364deace161bd38088b355ec4d1e6015c9905e06c25bfe380d1c227f0da7a1d0487d18305a35e351cab69bb7f53b2911ef2977089b16cd25b97199aa

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                      Filesize

                                      2B

                                      MD5

                                      99914b932bd37a50b983c5e7c90ae93b

                                      SHA1

                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                      SHA256

                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                      SHA512

                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                    • memory/1568-148-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-154-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-145-0x000001666A420000-0x000001666A421000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-146-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-147-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-113-0x0000016661D40000-0x0000016661D50000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1568-149-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-150-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-151-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-152-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-153-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-129-0x0000016661E40000-0x0000016661E50000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1568-155-0x000001666A450000-0x000001666A451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-156-0x000001666A070000-0x000001666A071000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-157-0x000001666A060000-0x000001666A061000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-159-0x000001666A070000-0x000001666A071000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-162-0x000001666A060000-0x000001666A061000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-165-0x0000016669FA0000-0x0000016669FA1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-177-0x000001666A1A0000-0x000001666A1A1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-179-0x000001666A1B0000-0x000001666A1B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-180-0x000001666A1B0000-0x000001666A1B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1568-181-0x000001666A2C0000-0x000001666A2C1000-memory.dmp

                                      Filesize

                                      4KB