Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 16:00

General

  • Target

    https://exchange.cert-sha256.co.uk/XV0VoUGVEUklNamhMV1RSU1l6ZEpURUZJYjBsc1RDODFhRVpMVVRGa2RsSktXak5tVGxveWMwaFlUa3h5YzNZMlQxTXhSVEZvU21nMVRtTjROSEpUZUZsRGMzSmlOV05xTTJoSE5VbFlka0pYVGtaNFREUnVhbEJYVkdJeFlUZEZZbVZ4TWpkQmR5OVBiVk55UjBKbloyWnpNakpNWkVOUmNHcEpVRGRxU0c4eEswNU9jMlV5TW5kWk1EaHlkbTl4WVRGVGFIVlNibXBQVWtKT05uVm1URTlDZFd0T1VEUjRRVkZTWVhGTFMzVTRiRFJKUzIxWk9EWlNObk14TVN0b1lubEhZazFhZGpoUWNGcHZOR2xDYkVKR05tdzBkejA5TFMxbllqaFdLMmRUU25VMmFHOTZNVVJ4ZURscWJUUkJQVDA9LS02Mjc2OTBhNTkyYzAwOTYxMDJkMDZhMzdiMzA5ZmQ1YTQ4OTZkMGYw?cid=212608527

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://exchange.cert-sha256.co.uk/XV0VoUGVEUklNamhMV1RSU1l6ZEpURUZJYjBsc1RDODFhRVpMVVRGa2RsSktXak5tVGxveWMwaFlUa3h5YzNZMlQxTXhSVEZvU21nMVRtTjROSEpUZUZsRGMzSmlOV05xTTJoSE5VbFlka0pYVGtaNFREUnVhbEJYVkdJeFlUZEZZbVZ4TWpkQmR5OVBiVk55UjBKbloyWnpNakpNWkVOUmNHcEpVRGRxU0c4eEswNU9jMlV5TW5kWk1EaHlkbTl4WVRGVGFIVlNibXBQVWtKT05uVm1URTlDZFd0T1VEUjRRVkZTWVhGTFMzVTRiRFJKUzIxWk9EWlNObk14TVN0b1lubEhZazFhZGpoUWNGcHZOR2xDYkVKR05tdzBkejA5TFMxbllqaFdLMmRUU25VMmFHOTZNVVJ4ZURscWJUUkJQVDA9LS02Mjc2OTBhNTkyYzAwOTYxMDJkMDZhMzdiMzA5ZmQ1YTQ4OTZkMGYw?cid=212608527
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadc8e9758,0x7ffadc8e9768,0x7ffadc8e9778
      2⤵
        PID:5056
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1980 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:8
        2⤵
          PID:3184
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:2
          2⤵
            PID:4540
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:8
            2⤵
              PID:536
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:1
              2⤵
                PID:2988
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:1
                2⤵
                  PID:1364
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:1
                  2⤵
                    PID:2632
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:8
                    2⤵
                      PID:4704
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:8
                      2⤵
                        PID:4084
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 --field-trial-handle=1900,i,18432290660293973934,4731041779760048167,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4924
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3136

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        120B

                        MD5

                        3917561c979c8013a93ffd7354f83232

                        SHA1

                        95e4f5d0c41de5735d9f04d7753fd502e2c3b8e0

                        SHA256

                        10ce12c908c1223c20b8d5ebdac6e0a9d44ad7b20db7e615a1cf49a6c2705f69

                        SHA512

                        84b4f7ec547f587c0b8a7ee10315e6b9b17332ada2c18067dc38f26e42a852e2cf2626fe35a3a912f6362d41957d73a8f4c78fbb175abde735e04a4d63f63b0b

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        6801a350800d435d1cebfb2643c016fe

                        SHA1

                        44382ad2b3d9c156ca6654a01ca53c83d21406e1

                        SHA256

                        9467572239b6805c876f0b2a0a8d3fd4256c0915b34af4cc43cb769fcb28f077

                        SHA512

                        e151ec41ca11d1efa1eed696421fed43712007fada60d18f37d6701379d606b76b442973d008b3172f7acee1c1906fcb0e4e5b5d08fd29281bff249aea07cda3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        868B

                        MD5

                        ccf3b0e9c83fac7746380c9e7527af0f

                        SHA1

                        c7cca68ac8ef398718546dbfad994d1e1db8fb05

                        SHA256

                        fa940ea6ee823634e0368fd2dfc3163eac55d782cd1c95ef57432ae888fde246

                        SHA512

                        d6c3a5080f0acf3e75101944c7eeba32b529301e7bc28abb90b4a2f11d1004193b4a7f72f3b8a5c9fd9bbbe03c58cfd8706bfc922d4be993d82c325191e4f216

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        5d065d3f79b4eaabf7b33debeb9b1f5a

                        SHA1

                        88cca02e11295b6b5b913dc42a1e0f50d740836c

                        SHA256

                        eeda85de80e65b51620a097d2e1cab8e531f4828fe6f0cb8292783cb9b638f17

                        SHA512

                        d8ba443de276ef24c5a9de203dc26588d5db3c114783462f5c4c1b48b3b3208544aad98c0d6dc074ae251f66aada670dbbbdf39c15971d855e633ff6165ee955

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        115KB

                        MD5

                        df234321851c8d5a3bdcbf545e78e4a3

                        SHA1

                        e3333f2a9b5894fb2f7be7ab4bac2fef3bb70c52

                        SHA256

                        fc01415c1b966df0e021de5adfae7f827e77647c070d66c5b783ca38c38c32bb

                        SHA512

                        206b0dbbb27d1900fe18ea5e0cc3d3bbb3d1897c009ae750a93f473134980c86af23325dafa092cc229ecd2add91f68a47b017856a642bc37dd960fcec81f155

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd