Analysis Overview
Threat Level: Likely malicious
The file https://raw.githubusercontent.com/SplashGG/dl/main/strless.exe was found to be: Likely malicious.
Malicious Activity Summary
Deletes shadow copies
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Legitimate hosting services abused for malware hosting/C2
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Gathers network information
Enumerates system info in registry
Interacts with shadow copies
Suspicious use of FindShellTrayWindow
Uses Volume Shadow Copy service COM API
Modifies data under HKEY_USERS
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-12-08 14:33
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-12-08 14:33
Reported
2023-12-08 14:33
Platform
win11-20231128-en
Max time kernel
35s
Max time network
13s
Command Line
Signatures
Deletes shadow copies
Downloads MZ/PE file
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Downloads\strless.exe | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
Enumerates physical storage devices
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Gathers network information
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\ipconfig.exe | N/A |
Interacts with shadow copies
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133465196035464824" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key deleted | \REGISTRY\USER\S-1-5-21-3484251756-2814966285-185304317-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU | C:\Users\Admin\Downloads\strless.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-3484251756-2814966285-185304317-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache | C:\Users\Admin\Downloads\strless.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Processes
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://raw.githubusercontent.com/SplashGG/dl/main/strless.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcc87d9758,0x7ffcc87d9768,0x7ffcc87d9778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5156 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5308 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5316 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4956 --field-trial-handle=1808,i,15093434241284001485,14123266761129064371,131072 /prefetch:8
C:\Users\Admin\Downloads\strless.exe
"C:\Users\Admin\Downloads\strless.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /for=C: /quiet & exit
C:\Windows\system32\vssadmin.exe
vssadmin delete shadows /for=C: /quiet
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C ipconfig /flushdns & exit
C:\Windows\system32\ipconfig.exe
ipconfig /flushdns
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C FSUTIL USN DELETEJOURNAL /D C: & exit
C:\Windows\system32\fsutil.exe
FSUTIL USN DELETEJOURNAL /D C:
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | raw.githubusercontent.com | udp |
| US | 185.199.108.133:443 | raw.githubusercontent.com | tcp |
| US | 185.199.108.133:443 | raw.githubusercontent.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 202.179.250.142.in-addr.arpa | udp |
Files
\??\pipe\crashpad_4548_OHMLHUSSYTWBDHFY
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
| MD5 | 99914b932bd37a50b983c5e7c90ae93b |
| SHA1 | bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f |
| SHA256 | 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a |
| SHA512 | 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd |
C:\Users\Admin\Downloads\strless.exe
| MD5 | 7fb60ff8c9849f18a1cec88180389ef4 |
| SHA1 | 4e7633c8e3b9b23a63e89b41f47918dbc7f78059 |
| SHA256 | d3f0b6a5e1797be376a82e6887f414cfb448e4fcc87d9d42c2672b387f0e1f3c |
| SHA512 | 12237d943a687ff3af4064d2870eebe13d1cfbf70147270b39f7d400ec5a1ad069754236759273045be7f0e41e73e539076a7202605f45b45aef979af90178d1 |
C:\Users\Admin\Downloads\strless.exe
| MD5 | 7fb60ff8c9849f18a1cec88180389ef4 |
| SHA1 | 4e7633c8e3b9b23a63e89b41f47918dbc7f78059 |
| SHA256 | d3f0b6a5e1797be376a82e6887f414cfb448e4fcc87d9d42c2672b387f0e1f3c |
| SHA512 | 12237d943a687ff3af4064d2870eebe13d1cfbf70147270b39f7d400ec5a1ad069754236759273045be7f0e41e73e539076a7202605f45b45aef979af90178d1 |
C:\Users\Admin\Downloads\strless.exe
| MD5 | 7fb60ff8c9849f18a1cec88180389ef4 |
| SHA1 | 4e7633c8e3b9b23a63e89b41f47918dbc7f78059 |
| SHA256 | d3f0b6a5e1797be376a82e6887f414cfb448e4fcc87d9d42c2672b387f0e1f3c |
| SHA512 | 12237d943a687ff3af4064d2870eebe13d1cfbf70147270b39f7d400ec5a1ad069754236759273045be7f0e41e73e539076a7202605f45b45aef979af90178d1 |
memory/5340-45-0x000001B2EF9B0000-0x000001B2EFF6E000-memory.dmp
memory/5340-46-0x00007FFCB45B0000-0x00007FFCB5072000-memory.dmp
memory/5340-47-0x00007FFCB45B0000-0x00007FFCB5072000-memory.dmp
memory/5340-48-0x000001B2F0380000-0x000001B2F0381000-memory.dmp
memory/5340-49-0x000001B2F26B0000-0x000001B2F26C0000-memory.dmp
memory/5340-50-0x000001B2F24C0000-0x000001B2F263C000-memory.dmp
memory/5340-51-0x000001B2F03B0000-0x000001B2F03C0000-memory.dmp
memory/5340-52-0x000001B2F26B0000-0x000001B2F26C0000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 45f497f027d4f066ea3a924648ff637a |
| SHA1 | 221bc91117694e484620a2fbcdaaaee6ca99d241 |
| SHA256 | 790536a0cd61027af69ca7cb9c1c9e2e60df53c42192ce4e844cc6db1d92e170 |
| SHA512 | 2fffb1899d6a3f71bb1a4cff98532b937fcba8dcc80881c12d1a1e7d51399423bc07b3fbbde76555c2c4847487e48784a4537ceb9a99d0e5b723a66fca4b26d9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8ee7c575ae20d83c4214f1563a140f16 |
| SHA1 | cf77d99acccba0eacd7fdcba36684cb179d69303 |
| SHA256 | 6c45422858470fd5ac5b7cee1155aab93f29dd206473634fbc12bb5b459ad09b |
| SHA512 | 3e92e130733981e4f5fefce8a750fb2c5e06d501c297c49278995909cff0b15b78d3c0d7c8d40986ce3a9321cf09880a9cac69001bcf8b172175af1dcec3b51a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 165cd881ff8843d0e0d4c1e1c63f5d04 |
| SHA1 | ce3b7bda11a327ec62a631c9b06bbe2a13e43c8c |
| SHA256 | b6322383607d66c043f875688580f88c65cb955d6af516a635eae589435d0f73 |
| SHA512 | 1a339e99de79d795db9ac6b0ae1f1aa397016a6d3b61dd55e924f13690def1c2e69a3417d31accca6027e9761de9fb701565237369a35cc62e663cf8af2ce558 |
memory/5340-68-0x000001B2F26B0000-0x000001B2F26C0000-memory.dmp
memory/5340-69-0x000001B2F2690000-0x000001B2F269C000-memory.dmp
memory/5340-70-0x000001B2F4FA0000-0x000001B2F4FBA000-memory.dmp
memory/5340-71-0x000001B2F4F80000-0x000001B2F4F88000-memory.dmp
memory/5340-78-0x00007FFCB45B0000-0x00007FFCB5072000-memory.dmp
memory/5340-80-0x00007FFCB45B0000-0x00007FFCB5072000-memory.dmp