Analysis

  • max time kernel
    600s
  • max time network
    494s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-es
  • resource tags

    arch:x64arch:x86image:win10-20231020-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    22/10/2023, 16:11

General

  • Target

    ngrok.exe

  • Size

    24.0MB

  • MD5

    34985fae5fa8e9ebaa872de8d0105005

  • SHA1

    a35c3e85ab82ed26ddbed639d16e56df0870ab6b

  • SHA256

    a1a26778656c5215ab1d939ebd9088827f69923ecf53a503b04bb504fdb97752

  • SHA512

    99caddbd4966ff46b54c8a5073b2634e32dba2b4b2571b217df729793d6e6f1fdfe0836fe884ccfe37b8476d8e096c3caace45dbd288c17761443a314ffe5271

  • SSDEEP

    98304:0mZ7o8sLX5utFa66b+AWAmz7u4DzX/7x/tSZBxHwhrBBqVwkXglkHBx/EDGUF9QJ:PA4Fa66b+AGf/7NtSYki3F2c7OVm5G

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ngrok.exe
    "C:\Users\Admin\AppData\Local\Temp\ngrok.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\ngrok.exe
      C:\Users\Admin\AppData\Local\Temp\ngrok.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:920
    • C:\Windows\system32\cmd.exe
      cmd.exe /K
      2⤵
        PID:4600
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe93d99758,0x7ffe93d99768,0x7ffe93d99778
        2⤵
          PID:656
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:8
          2⤵
            PID:1236
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:8
            2⤵
              PID:3424
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:2
              2⤵
                PID:4632
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:1
                2⤵
                  PID:3440
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2496 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:1
                  2⤵
                    PID:3768
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:1
                    2⤵
                      PID:4988
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4480 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:8
                      2⤵
                        PID:2668
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4724 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:8
                        2⤵
                          PID:4752
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:8
                          2⤵
                            PID:3644
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:8
                            2⤵
                              PID:4536
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3788 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1548
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:528

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              7f61b28b51ddf42ae12ac6b4fcb00eac

                              SHA1

                              fc5f8e45bf2fca3a77b77de4eff5982a0d540ac7

                              SHA256

                              059fc7d8f35c24caba1c244a20228f68e723b337584d59eae078dbd3a942863a

                              SHA512

                              3a61bffa7c08b1f7ba27a9e605733f4f7a0df69c899892d8f4210db24524795c301838e7d78959ab01e8b536d1207a1ec7afdbe9db14b378cff319784478d8cb

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              371B

                              MD5

                              2c84a82ae790d3efbc8596e877bea23d

                              SHA1

                              72a991c328f3b30a8ddd2ca2655589bde4eda3fd

                              SHA256

                              52c99222c154f69a86204777250dd78b6ebadb7dc8e1163205b702c67d9e1f1e

                              SHA512

                              f702aab233f2ab5e6500547cca833b8c1f8eaade641212b5a0f9cc4b62556b4daa1b195b96c43125d62be945649bb88e983649c7dc8a2cfba4ac85549019cb59

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              fd9fbabe4d4b1fb0bbcd1d8c8d15da02

                              SHA1

                              6d24928ba239df990b7b2cfcde733a25d7c7519d

                              SHA256

                              5353e74f1024a8aa02948bbf219f270c0378d5e8eedfa567c1be6b9a7bfe8c53

                              SHA512

                              4946c4b17e4c5cccdf711382fec4ed91be820880cd2dbcf848b81e8e64b3b60bcc5d7ea23fc13a937e68fbecb7358071b27b61f4cb30429b8f65779a0d3be99e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              8148e9344dbaca77afbe26f1e4e06e63

                              SHA1

                              7b3c82f27c19d5291141170c332e0fab66c3a409

                              SHA256

                              5babe192a97d65c72e81e6959969dfddf94a81297e4f07a1838ffb857d44a86a

                              SHA512

                              9827106042aec7f6c58b33deaa047797837263adba5b15bb4bce496e5a24baf365957a02a381e95100691f0e5a208754fc1fdbce0fdfa925811482a961df0f06

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              52c141fed56908cbe69f6b04e7da58e7

                              SHA1

                              b01d9e68fc0c9604ffa1b1aa2e48c682fb2168c6

                              SHA256

                              5371d3bdadfa23fdc86629393202e7629c49fac182e8bdad9736151f91064dc0

                              SHA512

                              008e31e2d218bd6b19515fb6e6c450c1341d42b40190722c7d4b357af493e3348412f712d5b976ebe37e288270fd3cd7960cb584a053b938f14903d70e4c6fb9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              212KB

                              MD5

                              a7b524b4bc8636e168371fded3dae9a9

                              SHA1

                              e2f8efc60a7ad00a2b78d3cc5e527ef4c4166e1d

                              SHA256

                              728d139535f344e3abfb5b35766ca5b5ee25dd732dafd3d374bdae2f775cb894

                              SHA512

                              8c322104d6e0fbd4e4950459451af1ae34d19da6b78fd1f4f06c44a86976fa51fb06f091829b1a96badd6e74b1b7297d760a0c17a2d551d95e2fd7df2b23ba31

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd