Analysis

  • max time kernel
    299s
  • max time network
    286s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 11:57

General

  • Target

    https://www.facebook.com/people/electric-ola-scooter/61554405390138

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.facebook.com/people/electric-ola-scooter/61554405390138
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7b5c9758,0x7ffc7b5c9768,0x7ffc7b5c9778
      2⤵
        PID:3176
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:2
        2⤵
          PID:3792
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:8
          2⤵
            PID:628
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:8
            2⤵
              PID:3532
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3296 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:1
              2⤵
                PID:4556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:1
                2⤵
                  PID:4680
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:1
                  2⤵
                    PID:632
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:8
                    2⤵
                      PID:2796
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:8
                      2⤵
                        PID:4828
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=916 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2460
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:4652
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                        1⤵
                          PID:1152
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                          1⤵
                            PID:2300

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                                  Filesize

                                  16KB

                                  MD5

                                  a59f749193fd0463146342235e399d7a

                                  SHA1

                                  74370f27e2c24232dbe6a18737666dc72f178346

                                  SHA256

                                  49c88a3b66bfb4684d360cc375d10a41b2e2e70372f96a4642eb12f76e918cc8

                                  SHA512

                                  ee85ca64901fe04bb7f507ad822767475127b61938fb58cddf35c2f65ad01f4054f73bb2ba9365a4cf6249dbb0c170e715c2cece3a6a567e7140754f70333f6f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  720B

                                  MD5

                                  1dd990c0c171e57f844f17a2fc9d0263

                                  SHA1

                                  92b497ea5ab9881d06b5cb701fa672172def38b3

                                  SHA256

                                  eafcc3b185aa105594f0bf972b6b64d3a2f325c90016fddfbaa7cc44d84d2d02

                                  SHA512

                                  ec0047b1bb154b95f7ac06cabf75adb9dba1f54baf97e2a42f46f5db6864a2302ce00a804024f96d77f53818366de811c2b9cdb4cc66a2fed7c4a00b3ba2d928

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  45716825cd04183d39929f7a2ed90f99

                                  SHA1

                                  693ef5decf1937500d26e6f8db4a3105747c40fb

                                  SHA256

                                  c04952b9af4bbb052fa5c2641084b76af013cb4453ffe68517b3706dc9aada56

                                  SHA512

                                  d17a803ceca9bf66e10737da1397e0ded33f81d21cfcb05afbd07c497f901b8518aea86eafe3b372ba38459a4ca876a939f7d5877af1bce400fcb8fece44a7a7

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  91ccc43728ce9f3c1308dd68e47c7201

                                  SHA1

                                  5a04b28be487ff6fc8d5adf37fec04a7cfe1705f

                                  SHA256

                                  2709edeaa0dd6d788fe67e4c686e255595301bc2c615de75ea94da092b5ab6a2

                                  SHA512

                                  31dc943a4825f0c4e4f748590bdaaf44526a15302cb82a0544335965e9eb4b3619df814c0ac9643e00a041d0affc5f7224f549a88e149250536d5ec53034044d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  ae11a2156cad69de64c43df47f6c655b

                                  SHA1

                                  fd0df06f5e2e59e42811a8249cfd96d7ed839532

                                  SHA256

                                  8fba9f63960acdb504015193ab5a5940aa598828dbbd29124956247845068622

                                  SHA512

                                  053f2763371c070dfd6b075e759c435537754d587e857ce9c96e5d915dbfbed6cb1362c329b2dd24071b2933b49d65cc649fcbe8cbe98396667f2a0d78ce7935

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  539B

                                  MD5

                                  92c0d6aaae10301cc7be064de992066b

                                  SHA1

                                  cce1606b71d29897675c83cc6a5437e127ef6e7a

                                  SHA256

                                  461d5ecb1d01c3241d5db42079f8cd0801559ced6de755b40eaf3c2c1bc49a7d

                                  SHA512

                                  cd46cd7bf1d12aa1c2e9da229a9d47b74691d14583f8683d4e53e086ab56d25c84cd6da58ecaf843b0ad87e17e987b8a387510c682a7be935487152765dc1b51

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  539B

                                  MD5

                                  23eba17684b5b2051e4821a4ce59ffa0

                                  SHA1

                                  c8d4b224c10eebd8e070e8ec8df8f13000652179

                                  SHA256

                                  b98d2f712fcfc426bc906537dcd604c8f419ab6292abd4fc49ace6b71345221c

                                  SHA512

                                  879749630366bdc458a069cc33d38152ed19df733d0bb300db485eb81cd1d379e5f9b5c2b8465d1d2a359962c49742dc261ce2472be52e86f1ddb108d5c64698

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  539B

                                  MD5

                                  729e396dcb6ae11c1ce66cff87ca33d7

                                  SHA1

                                  3259177fb474cefcc6ac48d22008987d648dc2c8

                                  SHA256

                                  9d9e92643074f44bc8adeb98068b75c0b62840ba44040931e66b1775c806721b

                                  SHA512

                                  45c4277edcfcf36aa4c894d71ee51c73ac7b8aa196ccae9ad6838f40c10b545dbd36a2cf4278bfccbdbab92196f78126660db5698453ee557e815156ca1bf395

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  539B

                                  MD5

                                  3bceacc9c86f74914e68e623003a6d23

                                  SHA1

                                  23e8bb7126603a0468902edc644df41085157c80

                                  SHA256

                                  9ef4d17b68a7fbab64fa1922bf6036cc6ca7eddad9359ce3308248bd37bd3987

                                  SHA512

                                  ee4d31dc434d2e48c18e5d409ed948f51f93b47b2bab232e82a1ee209ecd049bb2097270e3dcc2b7a4a84d9ad2b403cd5f37fa47373e93fdaac59e5e942c96eb

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  6692846cadd5b9622d9145676b581b6c

                                  SHA1

                                  c5066c52131a6c79c4423504a8d4129597fa3a4c

                                  SHA256

                                  b3aa7b55a89536fc50b4d1ad9e88b574f4f3a55b9459de035aa97acaed7631c8

                                  SHA512

                                  d2d08089c08fdece369ad32484788774a00a9bde4acb9a269c435917e16c328c3688417540f9260e1752a7d195ceadccfe8048472acab0d42140d2ccc33ec0f3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  115KB

                                  MD5

                                  a06c7354f7e4f364f2078aae0880510f

                                  SHA1

                                  84392fc397b984000eccde8a934fc38ff36fd9d4

                                  SHA256

                                  f37e5499a6a147be51b2339c0ca0e58a7a7b0456d3ad2a50bb29b76a7943b56c

                                  SHA512

                                  8298fd421f4011f4ac456782ad108b5dd4c199348acaa16a39fc7abfd8118cd2934ee51cce0285e534974cef72eb54f2f5208a4ce9b77f22816a0a591d7a4180

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • memory/2300-253-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-261-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-252-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-235-0x000001635C840000-0x000001635C850000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2300-254-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-255-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-256-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-257-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-258-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-259-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-260-0x0000016364DF0000-0x0000016364DF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-251-0x0000016364DC0000-0x0000016364DC1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-262-0x0000016364A10000-0x0000016364A11000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-263-0x0000016364A00000-0x0000016364A01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-265-0x0000016364A10000-0x0000016364A11000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-268-0x0000016364A00000-0x0000016364A01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-271-0x0000016364940000-0x0000016364941000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-219-0x000001635C740000-0x000001635C750000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2300-283-0x0000016364B40000-0x0000016364B41000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-285-0x0000016364B50000-0x0000016364B51000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-286-0x0000016364B50000-0x0000016364B51000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-287-0x0000016364C60000-0x0000016364C61000-memory.dmp

                                  Filesize

                                  4KB