Analysis

  • max time kernel
    69s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2023, 12:44

General

  • Target

    3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c.exe

  • Size

    1.1MB

  • MD5

    56ac9e72644a8dae8c1968d63a26e58a

  • SHA1

    d0349d04f33400541898426438d9e036d21decc5

  • SHA256

    3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c

  • SHA512

    d4f5c176b3e4fda2a318fde3ec3702d9bf102bd752ee42b4549b9fd6630fdcbee20de63fc7a403f60768ac7c0a7d780bc542c8d60f4e2b9eeb19a40aba49ddc1

  • SSDEEP

    24576:mq5TfcdHj4fmbi2q+0MmV0VMXeyrtoT1GokHTQoCwsC+Y:mUTsamOx9RoBVoCwT

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c.exe
    "C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe
      "C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -72189998 -chipde -e37278fe332e42d1af33e4480ad52248 - -BLUB2 -twgazbqkertxqmwh -2472
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1972
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6dd9758,0x7fef6dd9768,0x7fef6dd9778
      2⤵
        PID:2528
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:2
        2⤵
          PID:1016
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:8
          2⤵
            PID:2588
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:8
            2⤵
              PID:1608
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:1
              2⤵
                PID:2536
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:1
                2⤵
                  PID:2812
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1360 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:2
                  2⤵
                    PID:820
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:1
                    2⤵
                      PID:1812
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3432 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:8
                      2⤵
                        PID:2948
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:8
                        2⤵
                          PID:1092
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3864 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:8
                          2⤵
                            PID:2196
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3564 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:1
                            2⤵
                              PID:1576
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3992 --field-trial-handle=1332,i,4633731598284950038,872125472216130448,131072 /prefetch:1
                              2⤵
                                PID:2704
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:344

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\3a30575e-cb3f-4af8-9462-7a6c6b6d21ca.tmp

                                Filesize

                                198KB

                                MD5

                                dd461c51cb628e4be4f5007b4d401569

                                SHA1

                                f6f972f0b7955d06e73157fd5089a0ee26448723

                                SHA256

                                811248334c4c3bb54a97a945745846daec9ec928907778f79ba2fd34877f0d96

                                SHA512

                                a6b2c0f54b42df512b693690f6acff51a70840320666d4067ab2417e11ece2f1d058c06ed125c59f12a02f2fc7442737c7fe0a0b05975d21b45906f2cf733d0c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                523B

                                MD5

                                13416a8eefc98e6d04a597540effb758

                                SHA1

                                46df517a2bbe48355db8019e59433fee5afa6138

                                SHA256

                                44503796b8113c9c925500938a0607c6fc60937505f23a2925c38ba838d324f0

                                SHA512

                                5b7911be12e5a4c77aeb76cf7660d211ae645bf776f62898fa74b6ad5819f7d24b715488266f3b5eebbb3f894fa5e1b87b52ac3262dc896ea4f38edae1d780ef

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                2563686fca6830713acd505d47c54f7f

                                SHA1

                                0f775cfd3e37964aade0d2b46e283243d544caac

                                SHA256

                                ebd033804ea88dd10e5a72e6c7f27f647aa7be8792907b32a6dd2a2ee6922d35

                                SHA512

                                1d2402a5a1b445da488a18a0de199673bcf3f4e8a2f015c9856c370022e602b9c2345dd5e6f08e8bf0fcf68eab323815a096294807bd4521192e9337c22f8676

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                d44fa3bad596815bcffaef25d6252dab

                                SHA1

                                b9a7b14a43601ebcf2c71a00e6045767f44a4200

                                SHA256

                                fff22ee0da5f2bef7c7c7835ecbe12d0fa2a6f60cc5ccf49c1a61770bc8475cb

                                SHA512

                                cfb1f222270b1f9b0fce2c11bbbb1fd741d94f9933b4d167d2d2ca101e8bf2416a2a0b4c7dc30549dd2278ff437aab08801bc26177c52a48d0e6bb8382242239

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                Filesize

                                16B

                                MD5

                                18e723571b00fb1694a3bad6c78e4054

                                SHA1

                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                SHA256

                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                SHA512

                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                198KB

                                MD5

                                61e4384af6265c90942fbca589a6b70b

                                SHA1

                                fd2fc865501e73b8e880e5531fc3a9a4f31361f1

                                SHA256

                                d5c349794ce5796820a793253e892474a60965ed7ef8e8ef7fc917bb81b8959a

                                SHA512

                                90ce958e64c09a630efa5544823b829f9c2c20765aa22197646ac862e11c2e7f6ca52a768264f18fc02f0144a549431c39a4c354bd55ae578da15a8d500a54ff

                              • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • C:\Users\Admin\AppData\Local\Temp\DMR\twgazbqkertxqmwh.dat

                                Filesize

                                163B

                                MD5

                                8c934b48a05955c6cc934925f4c01e7d

                                SHA1

                                b6300c8e23a440e85637a6e8f028ff25bee676d6

                                SHA256

                                51be55dd44a7d2c782ef432971878a64040aec99c5ec0b53ac92d72bb2645992

                                SHA512

                                199896d1482d91a24d896452b1a81b4c717a2781b0261aa7b32bd5fc38cdf84bf000d9487efa6bd799ae5b9b04019f5dd64bb174f5eec285d76aa9d8f3d1aa69

                              • \Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • \Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • \Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • \Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe

                                Filesize

                                373KB

                                MD5

                                1b81fa48134378f2b8d54a41fcfcf0ca

                                SHA1

                                ff6fd97bcc603890c9bdffebe992a8b95d4f2686

                                SHA256

                                5e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707

                                SHA512

                                b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf

                              • memory/1972-16-0x0000000000840000-0x00000000008A2000-memory.dmp

                                Filesize

                                392KB

                              • memory/1972-31-0x000007FEF5B10000-0x000007FEF64FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/1972-26-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-27-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-28-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-29-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-30-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-25-0x000007FEF5B10000-0x000007FEF64FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/1972-17-0x000007FEF5B10000-0x000007FEF64FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/1972-23-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-22-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-21-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-20-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/1972-18-0x000000001B100000-0x000000001B180000-memory.dmp

                                Filesize

                                512KB

                              • memory/2472-24-0x00000000010D0000-0x0000000001346000-memory.dmp

                                Filesize

                                2.5MB

                              • memory/2472-0-0x00000000010D0000-0x0000000001346000-memory.dmp

                                Filesize

                                2.5MB