Analysis

  • max time kernel
    181s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 11:47

General

  • Target

    683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe

  • Size

    159.4MB

  • MD5

    43e39ee1d462c93244b9c89b0307a1ad

  • SHA1

    c112ec93ca07a5a3bb0cf20efd10ec6453d21edc

  • SHA256

    683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e

  • SHA512

    e9b39a4042ee54fbbee88afe43443fa5eae5f6ca014b314383470c10590787815a9da0b6221f29a196d148eb28a412dfcd88088b9cd49ed0fb0ecd1ade9bec23

  • SSDEEP

    3145728:7CnCREuLyywaoZ9EOrGpvTxr/4kI5aFQh:7CCREQyywN95CFTxrA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe
    "C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe
      "C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe" --type=gpu-process --field-trial-handle=1704,10568805017264404059,18337702041039726371,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --no-sandbox --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1712 /prefetch:2
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1296
    • C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe
      "C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,10568805017264404059,18337702041039726371,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --no-sandbox --ignore-certificate-errors --ignore-certificate-errors --mojo-platform-channel-handle=2072 /prefetch:8
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:4384
    • C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe
      "C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe" --type=renderer --no-sandbox --field-trial-handle=1704,10568805017264404059,18337702041039726371,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app" --enable-plugins --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\resources\app\lib\static\preload.js" --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:1
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "%windir%\sysnative\cmd.exe /c %windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\system32\cmd.exe
          C:\Windows\sysnative\cmd.exe /c C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1236
          • C:\Windows\System32\reg.exe
            C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
            5⤵
              PID:2856
      • C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe
        "C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe" --type=renderer --no-sandbox --field-trial-handle=1704,10568805017264404059,18337702041039726371,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app" --enable-plugins --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\resources\app\lib\static\preload.js" --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "%windir%\sysnative\cmd.exe /c %windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Windows\system32\cmd.exe
            C:\Windows\sysnative\cmd.exe /c C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:740
            • C:\Windows\System32\reg.exe
              C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
              5⤵
                PID:1936
        • C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe
          "C:\Users\Admin\AppData\Local\Temp\683c3a84406697e86a9186671e0205b9672c77779daed30328066a1fec8ca30e.exe" --type=gpu-process --field-trial-handle=1704,10568805017264404059,18337702041039726371,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2468 /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\Code Cache\js\index-dir\the-real-index

        Filesize

        168B

        MD5

        69791980faf98603b8704cbb7f3fe414

        SHA1

        b548ffedd898b258a131c425e5701d689727c0b7

        SHA256

        307dc70e3474beca9c2185988b1ac5e8bde4f2dbd4d8b63f97cd90363c44d988

        SHA512

        526f31c75618cce9ef32b2522ca37a1538708e65679d4305dd330ddc48b96a13bccb503a81ba1ffd8d3feb04335b36af288defd6db0b6e9c923d8a9579a37a23

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\Code Cache\js\index-dir\the-real-index~RFe5994a5.TMP

        Filesize

        48B

        MD5

        d15ecd7cc88531600d5ff092acdf1a0e

        SHA1

        3b7775d305c0ceb7b649a3f9fee122fd085f9ea4

        SHA256

        4cc62c71432dd6528032b9417ec5f640602b817c541440d05561805e868522ba

        SHA512

        44e6768336a7849710a6f19fdcb90f745b0688e4f198ea5bff5c932ed65c992dbe5d6058e8644a5210470ec0809ed2f4f5fa12551722cc9b643604e862ca0655

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\Network Persistent State

        Filesize

        458B

        MD5

        49094fd8455ef1d6bf77055c9eec4c83

        SHA1

        8320b1fd1bd23d7160d780aaba078ed965083da7

        SHA256

        4a298a730dc5b758841244ca14942c3e4db2504f97468c728f2c031dd38cef14

        SHA512

        e5e83e1d968c790665be03a23f0071156a6a9dbeb9c0bdf8599bf1606b17b013a9e3ee08bbb91f84cdb4f5e3d3c654ccb0a366adb7930d96f82587151b629557

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\Network Persistent State~RFe5a158d.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\TransportSecurity

        Filesize

        708B

        MD5

        72b8ecdf1f83ff1eb2cc5bff66205800

        SHA1

        11a1870c0f5fd7e80e97ed4b1238c720c58591eb

        SHA256

        e61d415c32625836d2f3d12cf9676c8d000d475ade092aee7288ee74c42bfa50

        SHA512

        1ed94ace8f3d5472877f652a3a8bbd5a9902c4cd417e429ac8d2c2ca1a53494aec4cf71bd715043f72e0b449e6683e0872392d76ec30d6423a481d6ada4d19cf

      • C:\Users\Admin\AppData\Roaming\ChatGPT旗舰版\Partitions\openaicnnnnet7dva\TransportSecurity~RFe596e60.TMP

        Filesize

        708B

        MD5

        216fc71680a27b2598bf6006286740b8

        SHA1

        57601182b4eae0dcde9270e3d30cd426d3adb273

        SHA256

        a00ac9472ed03b2af73fc9eea2635fea0e3d70da407e403790df116439b6cfd5

        SHA512

        22e90b1565f92b519f7be40336c443b020208cd56051d0cb26943d882e747a43d628b591d2e56edf4ca3629bc7313367ec33af159d8eb9ff98c3afd77b51956c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/1296-28-0x0000000010000000-0x00000000103AB000-memory.dmp

        Filesize

        3.7MB

      • memory/1296-105-0x00000000FF130000-0x00000000FFA97000-memory.dmp

        Filesize

        9.4MB

      • memory/1296-103-0x00000000FFAA0000-0x00000000FFE34000-memory.dmp

        Filesize

        3.6MB

      • memory/1296-69-0x00000000FFAA0000-0x00000000FFE34000-memory.dmp

        Filesize

        3.6MB

      • memory/1296-47-0x00000000FFAA0000-0x00000000FFE34000-memory.dmp

        Filesize

        3.6MB

      • memory/4384-45-0x0000000010000000-0x00000000103AB000-memory.dmp

        Filesize

        3.7MB

      • memory/4804-15-0x0000000000400000-0x0000000001400000-memory.dmp

        Filesize

        16.0MB

      • memory/4804-3-0x0000000077422000-0x0000000077423000-memory.dmp

        Filesize

        4KB

      • memory/4804-18-0x000000000BF70000-0x000000000BF85000-memory.dmp

        Filesize

        84KB

      • memory/4804-17-0x000000000BF40000-0x000000000BF6E000-memory.dmp

        Filesize

        184KB

      • memory/4804-16-0x000000000BF20000-0x000000000BF3F000-memory.dmp

        Filesize

        124KB

      • memory/4804-1-0x0000000077422000-0x0000000077423000-memory.dmp

        Filesize

        4KB

      • memory/4804-13-0x0000000009790000-0x000000000A19B000-memory.dmp

        Filesize

        10.0MB

      • memory/4804-0-0x0000000000400000-0x0000000001400000-memory.dmp

        Filesize

        16.0MB

      • memory/4804-19-0x000000000BF90000-0x000000000C459000-memory.dmp

        Filesize

        4.8MB

      • memory/4804-12-0x0000000010000000-0x00000000103AB000-memory.dmp

        Filesize

        3.7MB

      • memory/4804-5-0x0000000077423000-0x0000000077424000-memory.dmp

        Filesize

        4KB

      • memory/4804-2-0x0000000010000000-0x00000000103AB000-memory.dmp

        Filesize

        3.7MB

      • memory/4804-14-0x00000000072E0000-0x000000000730A000-memory.dmp

        Filesize

        168KB

      • memory/5040-106-0x0000000010000000-0x00000000103AB000-memory.dmp

        Filesize

        3.7MB