Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 11:08

General

  • Target

    https://go.blueally.com/e3t/Ctc/OM+113/cgKSM04/VVH5qL7XSFVSW12tzq-4ht7QFW11fj5c57lskMMhPPRz3qgyTW69sMD-6lZ3nHW9bt4tH3Tf9KSW8JhnwX2TfQSpW2cBf3w3s68MnW96Mh6V4YQkWTW1Hmd-J6HyHvgW1YtSDs6g7JyjW5-QYVv5xcwnbW6b1FLx24GXG3W4hFgXV7SKLDfW1lMvr_1M2mlNW7sW_743nmtPDW8m8GBH6qCJ3qW4v8k1t2Lbm9zW6_8xRV1cvKwRW1npNzT4nY6TSW5PPRm95-6dTPW52gr186SY91PW4x5fxn3vTkQDW1xRm9l6FSdBJW5pmRTP7Xyd3qf53mYSF04

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.blueally.com/e3t/Ctc/OM+113/cgKSM04/VVH5qL7XSFVSW12tzq-4ht7QFW11fj5c57lskMMhPPRz3qgyTW69sMD-6lZ3nHW9bt4tH3Tf9KSW8JhnwX2TfQSpW2cBf3w3s68MnW96Mh6V4YQkWTW1Hmd-J6HyHvgW1YtSDs6g7JyjW5-QYVv5xcwnbW6b1FLx24GXG3W4hFgXV7SKLDfW1lMvr_1M2mlNW7sW_743nmtPDW8m8GBH6qCJ3qW4v8k1t2Lbm9zW6_8xRV1cvKwRW1npNzT4nY6TSW5PPRm95-6dTPW52gr186SY91PW4x5fxn3vTkQDW1xRm9l6FSdBJW5pmRTP7Xyd3qf53mYSF04
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbee589758,0x7ffbee589768,0x7ffbee589778
      2⤵
        PID:4676
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:8
        2⤵
          PID:3844
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:8
          2⤵
            PID:1816
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:2
            2⤵
              PID:3424
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:1
              2⤵
                PID:5100
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:1
                2⤵
                  PID:1124
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:8
                  2⤵
                    PID:2012
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:8
                    2⤵
                      PID:4128
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:8
                      2⤵
                        PID:1304
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:8
                        2⤵
                          PID:2256
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 --field-trial-handle=1924,i,7430068454830652414,12178413420861120677,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3768
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:972

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          1KB

                          MD5

                          6d928bf46c2a123512761e162548ebe8

                          SHA1

                          0193f6bab5276a7b21c1b0b872806fc4e5751334

                          SHA256

                          c8ee17bf3b703bd7ced4e34d2da29b0befa537de746f2ebab058d1f24a0f2cb9

                          SHA512

                          a9f28551dedfd7ea410106d1ced92e28b3ce4ce1d084e3c841a6865a6fd0efb401a134abd458c04f4849ab7123b3ff7482c2e04811d81203b05834ceb6d61e70

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          9KB

                          MD5

                          a63c11a7ee8daf45a1dd8b4fd8a9e0b0

                          SHA1

                          7521b04364a7d0e30820441182763e5012da7fb1

                          SHA256

                          d42a58a7e13ee1ea723116d2213cbbac9587baf2389d495413dcd000e34b28dd

                          SHA512

                          e37a85af4171680fcd2136444ad153e5eb9895e8e0b0b78a33966a982b049b35fa5259622de63d6364f2f8b9ec95a4de81389a6686b049b36ea7351c29f41d3d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          5KB

                          MD5

                          a644a81e0a6b52d9d2f8ff9c16e7cb82

                          SHA1

                          88eb02f7e630dc5c148d0b3f52ab07797f458be3

                          SHA256

                          a517bf2b5d30b0267cb4c1f1c2b0144112c930eede935f4859119ee8a345d82d

                          SHA512

                          a63ecd728f94281e85024967622702703267cc35eef6e8c177340b454c6627b04ddb60cbdac2aaf945d8980f02d97982d06693832f29f9f55a210d10932a6b9c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          5KB

                          MD5

                          6e60d619cbd414fbba9e24019df91508

                          SHA1

                          25d97c018c3321f99071ab423730b3a183a94c33

                          SHA256

                          4a50ff20758f7c1880e7e970958f38f720b5316e2eade5c7d4954857f1a05002

                          SHA512

                          60e33282de715f77be6733bbbd8b9765c8b3819736e19e76f899a9da21cf709bb6abe98061baad94cf2014449477399c8662144867cfe075d98017f6d9c92cde

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          5KB

                          MD5

                          8342236c67be9e3cb45a45d82976365e

                          SHA1

                          68268fe7a9f2ab83e6e9c162cdc85911cbecfe02

                          SHA256

                          300744de004590ef3121110a62d08f4a13beed682ab0f9774ceb0de89a2f9a38

                          SHA512

                          d490f92074fb8b1b93fb07a56f006778bea19e3c720d597c6dc4f879800d065b17cc5161f3dd1df2091c3ef770b4d7b571977224617961fb0bb4f7f44bbbcaef

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          5KB

                          MD5

                          a82a61462b043959d8f6854b5bf4ef51

                          SHA1

                          94b09a2975967cf9bc46f5a3562f594724df50e3

                          SHA256

                          da6ddeca1b2d5673bd9e075b07f92168e020b4e7a4dd19b7ea399328fbd07152

                          SHA512

                          2ee48668ecf218344f6fdd726af8c96588e0b531866e4400e92933611d527c7e465634335e32733549e51a4058a2efa6953794e1d85e5942eeb0896e297ff8f4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          ac551c7255843f4931a757677fc3018c

                          SHA1

                          c5b8fcf119e1db0697b14b18121ece2074b4ed87

                          SHA256

                          0642dcdb4a8075b4908d4beea5164f10c000886fd98f34c8188b9004fca3c8c9

                          SHA512

                          7214d39e4694ed26547d250484f6796c611845a768617ac39c38ee78a4cc0ea7e3a7deb1a23ee398ccf4da17be5438cbb8e4a6e0ec9fa5c993389b65ebc10d63

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          116KB

                          MD5

                          679ce41e2bf70d3ae7dcd2f5ecf1faf7

                          SHA1

                          12176128a5313915aabda04a12cd827b378318a8

                          SHA256

                          c68ddb1a05816ea09f1d7bf39298e5be1ed91ba8cd4307aa99efb4b9024ba52a

                          SHA512

                          b444634a230eb222da8073977cbf806b2d7ec1625e262c3061e42fa65d30920e2f461e465e8da67f5f50de7a328cc08cf55ce5cfe669373e04c121014cb3977c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          135KB

                          MD5

                          b3c76cb9db683e036319a490b898ef3f

                          SHA1

                          0d20002ddd1fcc840b1d6349228a2ea0895398e9

                          SHA256

                          ea8ff2e856a433dfc7b9262923679af04845220d32f2ce6918e3aef8e3874423

                          SHA512

                          dadbea0630356faf75d247158c928513b858df3be27ebaf6eb026af88d2cecc0925c87792fccbb8d51a10266886992644048fb1bbc667a47d89ab7bc4acac48e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          115KB

                          MD5

                          a6afc9be5dcd869b80283cd6622a2a57

                          SHA1

                          704b0d81d533bd096985a21344d77399acfe3707

                          SHA256

                          dc5928117d603498ddde6c2c4c3f85a6e0aa2b0fabc0aaa42b131f4932db33a0

                          SHA512

                          d127c3311da36c4c6197758aa8f15f504443f9bd0862582a694cf43e58d631e011f530b438e6764f687ed027ecf9d4cfe6e7bc2e54b47c851471cd013894dcb3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          115KB

                          MD5

                          6401061c10a3098b83546029f10a19e5

                          SHA1

                          3031b174166c5d4ea4251b40a53101b91898fd59

                          SHA256

                          1be7c44dd4cc5921e78d402ba40326ad05e272fdd640b2386175c6fb79088ada

                          SHA512

                          db92e99d56076e214edbfcde5d87e6a11ad48e04434a35201a61323d1735911c1756742dc279844531e6b1d56e733a23460d1edfe02556bf55c1e2322a941a9e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd