Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:37

General

  • Target

    https://www.cloud.com/content/dam/cloud/documents/legal/end-user-agreement.pdf

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.cloud.com/content/dam/cloud/documents/legal/end-user-agreement.pdf
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8ba879758,0x7ff8ba879768,0x7ff8ba879778
      2⤵
        PID:1216
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:2
        2⤵
          PID:2876
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:8
          2⤵
            PID:2480
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:8
            2⤵
              PID:3068
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:1
              2⤵
                PID:5048
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:1
                2⤵
                  PID:2980
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4612 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:1
                  2⤵
                    PID:1480
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4796 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:1
                    2⤵
                      PID:3364
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:8
                      2⤵
                        PID:2768
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:8
                        2⤵
                          PID:2180
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:8
                          2⤵
                            PID:1384
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:8
                            2⤵
                              PID:3892
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3932 --field-trial-handle=1876,i,8219084169356441120,3369215433510588704,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3076
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:4356

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              894B

                              MD5

                              7e22924eb9a3744c716168dfbf20ea3e

                              SHA1

                              b7b4b58702f4ccfead673bae5f0e00da8072e504

                              SHA256

                              c3c367d71d3efd9a144bb829b19f5e456e36a3665a8bb7a092630509044ec40e

                              SHA512

                              0f612f6230c032d5bac4e09d5975a00735d4a588ff7203561c2673de11375f586628dfe4a6ce37dd0fcc0798fb196aab3a686afb773850200c9320eac7ac9bb6

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              539B

                              MD5

                              bd54b6d3df6373fcbb62f7b7de049eb0

                              SHA1

                              d974b415cc476ba9243fb67dc131f81f8c741a3d

                              SHA256

                              2f507d5ef8932ed41492afd44d32325061de630764f0ad85248e728d09627274

                              SHA512

                              fba42b0f85bc2bf815291c59e104cb741446669ad2cf9a623b1d94068dde9d2aa480c8a29f1ff0cac186db00d8f0509a25917f25df4e5d9632dda9bd00ff5743

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              3c7350d602d6c6ef6d6444c8a80d8c15

                              SHA1

                              bdcc864f02336324fa94a59d481d7480f509b570

                              SHA256

                              00fb4cb1bf00903ec7feb65c57d06b13eb6e27b59a808855dddd13af0a59ede1

                              SHA512

                              47cf1d355fa8a02c96032cc365f11939f28753b62c1c330a9392a98ee90dce92df5a5fb7d9680083eecee23c53c44a9f47469236c53b0f61dba6e7f891f46077

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              135KB

                              MD5

                              12ff79be0d0c36f68f103848abfead4f

                              SHA1

                              dc6f4b698cb2933f92c69df1bbf9885c36d2f003

                              SHA256

                              600a77b7b955af4c8f8a3c25d66df10382268ba2275c5e0593938af1244f6f4b

                              SHA512

                              7c09ea4d2ee884b555818c6c41a02d409dbee6a5f24283f3894ea2e6852bb9a7f309e39c26caaf1c8a58bee714a5e93a86a1aaef8b4aae300df769f97955066f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              42KB

                              MD5

                              ed853ddf2b9cd8b39d222af4157930e4

                              SHA1

                              760376d6083913c9270ebdcea852af85a652cb3f

                              SHA256

                              435d38e5cf257f2e40b08bb1b93a08cacd99040eac1df1c4ce2088c7c34f64a6

                              SHA512

                              b6c6f9ac0be5a33a4c189a0c0b25fcd19498d344e6af803c1e12301a866acb639bf0fd20f088128508192b5c91818217253cbbbede92dfb0c7ef9084d79020f3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              115KB

                              MD5

                              13db601073ad5f22eab855a8c7039c66

                              SHA1

                              da4597883d81b917e8e403fbc7a1e49349683274

                              SHA256

                              cb13ca7b9d8d3f4c5704c36b86e262853a42d26305bd06d979b134ada8181614

                              SHA512

                              4ac384bc7e6cd493294908565d2b3173c03d018d4691d4c999dfd25c229e585d18caebf30c034277cb816fa4a991bb01f905dec5272613bd59e0d69ee4c35e83

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              116KB

                              MD5

                              4b64e8fe9f44b4714be1926b5c1338c2

                              SHA1

                              ad11bc85f9f162007eb08699dfd50772d5636be5

                              SHA256

                              76bd925d97feefc62e6b27c1b53c4d4fc5bfc7b06f2abec9693b3b20cdc393aa

                              SHA512

                              4a2c573d1ad3170780fe8d51d952371068f505e9970db87fb39ae8be5cf44d43309a46955372146858e116cd12ecb4692ced63badad795983a08eb3384157e66

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • \??\pipe\crashpad_4848_MWMRXQQAQWBBFWUL

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e