Resubmissions

18/01/2024, 21:47

240118-1m8ayshghp 3

18/01/2024, 21:42

240118-1kd94ahgdk 1

18/01/2024, 21:39

240118-1h5dhaafa4 1

Analysis

  • max time kernel
    299s
  • max time network
    293s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 21:47

General

  • Target

    Transfer/level.dat11

  • Size

    343KB

  • MD5

    10c34d8de718ad706d772a7aff7982ce

  • SHA1

    1f650bed01f117802d1bcfcb96a6ca8f54e4043e

  • SHA256

    5cb7e257a5151b58e8f561745f5fac35af6e67cb0205bbc7a54a3a55040adf27

  • SHA512

    61fb1037d33ddf2578d526ad3c65ce9e12376327cdc383827cc17e416910093662bbaf7d91afe443527b820d7d387ee0d26419aa2f348bdf93b703854527540f

  • SSDEEP

    6144:JSoVito9JAW98wUHO+yTLkQw9oHYHc+/2KetSX0wdm5q2Q8t76y4PNP:0oVitSJh8wUHOhLkQA0YHROym51qP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Transfer\level.dat11
    1⤵
    • Modifies registry class
    PID:1944
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Transfer\level.dat11
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1048
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffab30e9758,0x7ffab30e9768,0x7ffab30e9778
      2⤵
        PID:5096
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:2
        2⤵
          PID:4744
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
          2⤵
            PID:4392
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:1
            2⤵
              PID:5112
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:1
              2⤵
                PID:2152
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
                2⤵
                  PID:4592
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4692 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:1
                  2⤵
                    PID:1436
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
                    2⤵
                      PID:4000
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4948 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
                      2⤵
                        PID:2032
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
                        2⤵
                          PID:5116
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
                          2⤵
                            PID:1240
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:8
                            2⤵
                              PID:1328
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5480 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:1
                              2⤵
                                PID:3736
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3288 --field-trial-handle=1876,i,11566477758362745945,13917320139482106313,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3024
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:1456

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                456B

                                MD5

                                ae93213728bb6c84301534fd0e70b26b

                                SHA1

                                54baa13bd26372e1bc79cc92b68d67f05ae04f43

                                SHA256

                                be213405f4099a91142936fdcf78b035da1c1b2d060b10d53bd57a191ae56ce1

                                SHA512

                                435d1bcfb691277508710aa1532aed48e60115a0ba1a966b216e8c4284177e1889a3c78e2d3ee67e26cd451f0b006752db56f1220838c791a386a10b594d3c13

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                5bd774d2df9052ce973b288ca4e722e9

                                SHA1

                                b397b8d4126ce6552f3390b2816639f57aa3f584

                                SHA256

                                087a98a8d93ad790d0bea3a9ddbc8f0271f869490bcc771c315b664be9b3d741

                                SHA512

                                602eb76886c5c59f0ffbb849079302ea6746bf4548104c2d776f8caf9d99f5d757ba2a5229a81cdf911ccfb372dee8cf830e8247bf621b422f16971cecef7191

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                5907b3f01712808517e37d280cd58fdc

                                SHA1

                                a22a21cd31f4cc889f5af248f73328037f5c0f78

                                SHA256

                                bd1061aa8db5f11a8a19c9c633a1f5d1866f8f59c6b3f62731e7d6540ea2eedb

                                SHA512

                                b956073e7885fe019f68bb77546af187aa444e32ea641b8937d0bd2d22212cac4f3ac2554f36d957eaf9c43f16e51e8eb4e5ace61a5ccde7f3272ecf6c2352aa

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                65ec7e82c032ece9649f0ae8e28e4aad

                                SHA1

                                67f9648314a0ed43d07f6944c1731e27c545d7dc

                                SHA256

                                a2b8fa25397d837aa9a797b0ae4714ef8d3d3c3265d11a8f9dbff9140f8ef74e

                                SHA512

                                d59c00bbfbbb7b2198a4aaf5c0915af81edb1027307be55c341181c63a3c38d17231b5f9753aff0b846634ba037d2c013670a054a88a7c86840f9d6fb586bf80

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                b5fa49020d8c69097429095497c34720

                                SHA1

                                42f3e3ebab8d8059b952271812fca54d05731531

                                SHA256

                                32c634be717f4b85b122067741db4fc1bf184df293ae3c6a6b72377cffa3f520

                                SHA512

                                ee89b445c5c65e5a186a2805f6a28112d6d79293358dd0fcad849c2e37b41b70297f26a054f24de0ad81c3d2215d9d3de0bf3c5a639cc0bb5feb81fd5ea58207

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                d8281d2ad2eb84034a80b3b19dc88ed2

                                SHA1

                                438f76fa6341aae53e8024f0fd410c64d6dd8434

                                SHA256

                                e91f5c06d8eae6503d320941d723b5580da923451b08733fe61c4d333d7941d4

                                SHA512

                                bae1b990b5a9f4c86625a91a06d00fa6d4334b292a002ece1c476f84159cb03e7c42e956abcfbd65fc6c0ca283e3da9b12d0b602ace22d7cd5ab4da3c8993e3d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                60c4ed74152e5d1390586cad1960bca9

                                SHA1

                                2e50bbdf1d70713e41b7ac825637430ddf3040a4

                                SHA256

                                c9bcfc15d063bf90dbfe4445a2aa18b94ea7f8ceb3625ab96dc073925adf544e

                                SHA512

                                44c70b7575c2b52edcdd177c6f8ef095d0322331da74807d4e2f627dac4f447a20c7eb42c368ebf6eb895a20b387b84305d3005e433a421348472685dd20321f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                da8d9f6f2e466e9df4d964a3a2a896c9

                                SHA1

                                59704623d25b0761ce4b203dc0866e5936b1cd66

                                SHA256

                                2815a5807c85e13ac1a43a2252709042c16fa6da800788e26d59b4cdc098787c

                                SHA512

                                1c3b30a0b6cbe7480a02cde0cea253e6149d767616e6849c9421994322921d956a3e1c4f6a10dca80a182a21c0ecd42df2bef5daa5cd27819ec38b96f894a509

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                7b67d06fe3d3b9e108bb4b8621b08f05

                                SHA1

                                38b75b539943303a2a611d5922809eb50ea2e94c

                                SHA256

                                f51a997b4e7c71ae86a76c3c348e94feaa1b74d9258ccb19aa4cd84c76e88381

                                SHA512

                                34a7c14f0b2a70e84956a5ca6c99ba8fbeff76bd40a583949b07ac4abdd51c4d548502e257a4dabc0ddafc6c0c291fca6e7f55159a4bfea8043d49b59784f53a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                228KB

                                MD5

                                b25781b21421a5817427d4c92baa1272

                                SHA1

                                2679bf960dc361b7c37cd56550ae3fb8a0e06058

                                SHA256

                                6e44d286c0025f6dfb7be18750267e8cb6a72d81185089f18a3fb4820a4d9e6f

                                SHA512

                                8f6f872d378be3761bffdce7bdc51e4b154762f341d924759bb727fa6b2c823405cf4a2b6ee78e49ce91cd3fec981790297a3e38ea700480f6315d8b6dc01d0a

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd