Analysis

  • max time kernel
    311s
  • max time network
    313s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-01-2024 11:28

General

  • Target

    https://buqkrzbrucz.com?r=dir&zoneid=1963280&pb=948705d096df7391785f960aa73567581699661348&psp=mjiglazy2gv_ucc3oaygtvlvafoqzree4df_4teuvgc3-qhnjdn17w7_rqjhx_gyjja_huhgzykpxlwe5p8r8cjmsuo_w6xcdxqxj8cyjqb-wmidlvn7umewiem4cmmy-5yjsjmgdnplyaovggc9nd2f_py4c8yahevtciiydryakprrwob_zyvhlckqujqgm00tmbn6e0uimlpo2syjs1brmh8ekqnx9cue6owwuscrded_oxdb1jckykx41podi-mdpbq9zcjdzhiuzjjcou_bvy2utdluuei4ik_j5zmjhnr-plozop1krcmgw2mdsqfr6kgv7e6eqomrh9zm_jh5s4z2tk8_dgj_8qnudt_oyq_bxh63inea_ppgikwgrwhbgepmqxykhs8efrympn6tfigdbhzyjtq8vuxb3jifgo5mz_syxmq1-hxw7k6b4dvfklvm8g6_rlzqgbipcn0cnjkw2y0f8-oogwgohvthmejnx7ooscoqrq-czdfatr6stps2khdppfwopm7q82l55fvho45f1q-toitzbseayaiwgef2puahdym77jnlh7tgay6pc5votee1d91-0ajiriu2s4omzqw3kggotuljzodthvqhudwsa0mvvesvr4ndbnnfk3oxkxuwzncsvsybj1qgpgvkd5tiac-woqsohtws_fprjbohuni_k7mobjtofi1b6a3vfmqc-u1f2mhwx16wpuu2wlri65ea94md_ogdzxic4mky5g84s69nnegxvcfbjnmep9ferrxgljswbjlfzppxlycl8y4staqbrr845t8uvxiqkvaz9ayp_3uc0fonxaba1heckufs_xd7lwuiht5e8fsnnltv4gmsw98qed3wwz7wybk26-uzgfb75ilhz3wsjdworwyk0tc6ao2bvyxwtnb25sgcd2ix27ggstfmr6wtqpm8hrpdelxmc_w5s7k27t6-hawhcu5gl3z7q5erngl_roycg2bfmmqpapkvyxijrcd9jjir4de4ptqk8nxzow_b&fdl=1&nojs=0&abvar=0&febuild=1.0.175&t=0&wcks=1&wgl=1&cnvs=1&os=-60&ss=1&ls=1&bb=0&plu=pdf%20viewer::chrome%20pdf%20viewer::chromium%20pdf%20viewer::microsoft%20edge%20pdf%20viewer::webkit%20built-in%20pdf&lang=fr&pf=win32&cd=24&ix=0&x=1872&y=966&md=0&afid=3770563231538176&eclog=0&sp=0&im=0&cha=x86&chb=64&chbr=%22microsoft%20edge%22;v=%22119%22,%20%22chromium%22;v=%22119%22,%20%22not?a_brand%22;v=%2224%22&chf=%22microsoft%20edge%22;v=%22119.0.2151.44%22,%20%22chromium%22;v=%22119.0.6045.105%22,%20%22not?a_brand%22;v=%2224.0.0.0%22&chm=false&chmd=&chp=windows&chv=10.0.0&pload=160&rlp=[0,0,41.299999999813735,23.700000000186265,2.3999999994412065,108.59999999962747,37,23.299999999813735]

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://buqkrzbrucz.com?r=dir&zoneid=1963280&pb=948705d096df7391785f960aa73567581699661348&psp=mjiglazy2gv_ucc3oaygtvlvafoqzree4df_4teuvgc3-qhnjdn17w7_rqjhx_gyjja_huhgzykpxlwe5p8r8cjmsuo_w6xcdxqxj8cyjqb-wmidlvn7umewiem4cmmy-5yjsjmgdnplyaovggc9nd2f_py4c8yahevtciiydryakprrwob_zyvhlckqujqgm00tmbn6e0uimlpo2syjs1brmh8ekqnx9cue6owwuscrded_oxdb1jckykx41podi-mdpbq9zcjdzhiuzjjcou_bvy2utdluuei4ik_j5zmjhnr-plozop1krcmgw2mdsqfr6kgv7e6eqomrh9zm_jh5s4z2tk8_dgj_8qnudt_oyq_bxh63inea_ppgikwgrwhbgepmqxykhs8efrympn6tfigdbhzyjtq8vuxb3jifgo5mz_syxmq1-hxw7k6b4dvfklvm8g6_rlzqgbipcn0cnjkw2y0f8-oogwgohvthmejnx7ooscoqrq-czdfatr6stps2khdppfwopm7q82l55fvho45f1q-toitzbseayaiwgef2puahdym77jnlh7tgay6pc5votee1d91-0ajiriu2s4omzqw3kggotuljzodthvqhudwsa0mvvesvr4ndbnnfk3oxkxuwzncsvsybj1qgpgvkd5tiac-woqsohtws_fprjbohuni_k7mobjtofi1b6a3vfmqc-u1f2mhwx16wpuu2wlri65ea94md_ogdzxic4mky5g84s69nnegxvcfbjnmep9ferrxgljswbjlfzppxlycl8y4staqbrr845t8uvxiqkvaz9ayp_3uc0fonxaba1heckufs_xd7lwuiht5e8fsnnltv4gmsw98qed3wwz7wybk26-uzgfb75ilhz3wsjdworwyk0tc6ao2bvyxwtnb25sgcd2ix27ggstfmr6wtqpm8hrpdelxmc_w5s7k27t6-hawhcu5gl3z7q5erngl_roycg2bfmmqpapkvyxijrcd9jjir4de4ptqk8nxzow_b&fdl=1&nojs=0&abvar=0&febuild=1.0.175&t=0&wcks=1&wgl=1&cnvs=1&os=-60&ss=1&ls=1&bb=0&plu=pdf%20viewer::chrome%20pdf%20viewer::chromium%20pdf%20viewer::microsoft%20edge%20pdf%20viewer::webkit%20built-in%20pdf&lang=fr&pf=win32&cd=24&ix=0&x=1872&y=966&md=0&afid=3770563231538176&eclog=0&sp=0&im=0&cha=x86&chb=64&chbr=%22microsoft%20edge%22;v=%22119%22,%20%22chromium%22;v=%22119%22,%20%22not?a_brand%22;v=%2224%22&chf=%22microsoft%20edge%22;v=%22119.0.2151.44%22,%20%22chromium%22;v=%22119.0.6045.105%22,%20%22not?a_brand%22;v=%2224.0.0.0%22&chm=false&chmd=&chp=windows&chv=10.0.0&pload=160&rlp=[0,0,41.299999999813735,23.700000000186265,2.3999999994412065,108.59999999962747,37,23.299999999813735]
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa78479758,0x7ffa78479768,0x7ffa78479778
      2⤵
        PID:1552
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:8
        2⤵
          PID:3036
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:8
          2⤵
            PID:1744
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:1
            2⤵
              PID:1604
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:1
              2⤵
                PID:3416
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:2
                2⤵
                  PID:1944
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:8
                  2⤵
                    PID:3724
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:8
                    2⤵
                      PID:4768
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1392
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:4924

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\47ee05aa-8104-40bf-a5e8-93759dc48918.tmp

                      Filesize

                      114KB

                      MD5

                      b15f87adb8cb628e2305166c9c785f8c

                      SHA1

                      0c76b9abebaa961caf6802ebdfc84e90b0fa391c

                      SHA256

                      c4093ac839e8a4040856fcfa8cc18513573babc76c60031d7ac20eed43568588

                      SHA512

                      7f57975d910e3aff9ef22d2ab6d2473fa5264b65a7fdd6f3bb5eb21cbf0418caaee847a1a3f63702783b3b74d8cefed26b30449716c5004574ee5042a27cd5e4

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\129aa492-011d-4a64-84bf-388dc3ddc4a2.tmp

                      Filesize

                      6KB

                      MD5

                      06aa92511ed421f0ec04e669d27d8a18

                      SHA1

                      50d9fd8dd8b5a580c4f63e7bb21773b666112126

                      SHA256

                      fe735e40860521cce13f28bdf5f1bf48ad1340f5cb3f5ecc0e80c9730d4e3c62

                      SHA512

                      0a8766f257b27cbed0633fd4fcc087a46b43d2cd2e102b7670fbc8fda54ec97aa119f9ea645cddf586cc6580786b451474f6d3398a8ad9eed41c5ffd06c76171

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      1KB

                      MD5

                      5711df610c7a1b5d42fcb2af25804ecc

                      SHA1

                      3466cec2e1dcc374639fd46cbbc5b6c29a7ffe48

                      SHA256

                      524c14df27a13757501b196ecee728fcee51a90c5fade0d4e196cfe90173733e

                      SHA512

                      0fdb4cbc0d3d2ade38a8e9305bbb4d6caba612781b860f4420fb192d943e39ea4fa45b76d5a62da286d8091e8a4f21cef98d27e514ac5e6f819bd7752fc8d3b1

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      1KB

                      MD5

                      0aea1b1111c47acff0868fbe72b6abd9

                      SHA1

                      29348881dc398ce29eb50f5bb0174b402991c97b

                      SHA256

                      18d6053190d8ada02c6bd9509a05c8631fa2617351005a9bc1518791a1c69cc2

                      SHA512

                      476bf23ccdc47e28a10de55809f35b8aa9d77fe6b7d8133dbacfa56f58033dab7b97c58b1ded535b8f12bbf38880178f9674846255de64a4aac4cee09f9100ec

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      b1dfd7d9365d5b69d2e4fc38da57ba2c

                      SHA1

                      19e1a5ea4ee9e1570103f8f34f81faad39656547

                      SHA256

                      109224d968a8f7563619b0c9abc78339b801ec67cbeb0a401d52207e503133bc

                      SHA512

                      75464b262900459f48846c89457b010dabfc204cc6f118f5ec10e1b1bf01b938fdbb668ce565dcb1733ad2c3a65a2951a0165508ffb6bfb7c91f1d2876bdc47d

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                      Filesize

                      2B

                      MD5

                      99914b932bd37a50b983c5e7c90ae93b

                      SHA1

                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                      SHA256

                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                      SHA512

                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd