Analysis

  • max time kernel
    243s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 03:17

General

  • Target

    https://www.serieswork.com/

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 53 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.serieswork.com/
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd3ca46f8,0x7ffbd3ca4708,0x7ffbd3ca4718
      2⤵
        PID:2092
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2960
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:3880
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
          2⤵
            PID:648
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
            2⤵
              PID:3440
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              2⤵
                PID:2916
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                2⤵
                  PID:3468
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3992
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:1
                  2⤵
                    PID:3544
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                    2⤵
                      PID:4316
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                      2⤵
                        PID:3840
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16352034876036130071,17291794915821633539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                        2⤵
                          PID:4472
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2904
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4100
                          • C:\Windows\system32\control.exe
                            "C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools
                            1⤵
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4804
                          • C:\Windows\SysWOW64\DllHost.exe
                            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                            1⤵
                              PID:3392
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                              1⤵
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              PID:1256
                            • C:\Windows\system32\cmd.exe
                              "C:\Windows\system32\cmd.exe"
                              1⤵
                                PID:648
                              • C:\Windows\system32\control.exe
                                "C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3868
                              • C:\Windows\SysWOW64\DllHost.exe
                                C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                1⤵
                                  PID:3380
                                • C:\Windows\explorer.exe
                                  C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                  1⤵
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2332
                                  • C:\Windows\system32\mmc.exe
                                    "C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /s
                                    2⤵
                                    • Drops file in System32 directory
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4648
                                • C:\Windows\system32\LogonUI.exe
                                  "LogonUI.exe" /flags:0x0 /state0:0xa3949855 /state1:0x41c64e6d
                                  1⤵
                                  • Drops desktop.ini file(s)
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of SetWindowsHookEx
                                  PID:452
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:1612

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\Computer Management.lnk

                                          Filesize

                                          1KB

                                          MD5

                                          7e4772236d8c36a0a65600c081c3be95

                                          SHA1

                                          d51b9685264ee7c3fb5bcc5b0203b6185cbd6562

                                          SHA256

                                          3cade068efc80b4551347dd8bb6e89a838fe2ea88e8ae5f458982a88275b8feb

                                          SHA512

                                          21e6dcf654abd1722a1081a2a2dc87daeb067adfc76cd2b6241b81a6d7f7adbefc7edeafd331b586d567f9f6b60fad0ba14ae0eaa42ac7d7f44c709f5e2e2c84

                                        • C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-18\ReadOnly\LockScreen_Z\LockScreen___1024_0600_notdimmed.jpg

                                          Filesize

                                          101KB

                                          MD5

                                          1765a76a3cb1d60d429d2e9a0c500832

                                          SHA1

                                          7821bb35ce216937fa5f19383e3211899511f093

                                          SHA256

                                          1a3d88e9c6b858be7737aed9bf044494cf4c443683284c6ce97763b5785812ca

                                          SHA512

                                          6c0a2db0e39e0ce5fe4e7bb919fb0981cba55e1a51f0a47df67dd5a1f416e1ebe505d072fc89eb68cf956caf0c2abc272450dcd5410a51c7af6c17501f6d7e45

                                        • C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-1497073144-2389943819-3385106915-1000\ReadOnly\LockScreen_O\LockScreen___1280_0720_notdimmed.jpg

                                          Filesize

                                          378KB

                                          MD5

                                          8a35580082568d52005a776f881c938d

                                          SHA1

                                          d8422864484620022369041d791292af22a4ac7d

                                          SHA256

                                          52d8d500850bf4619568b01779f8d6962fce865a0b4ea5a86d661d049da47bf8

                                          SHA512

                                          c8d68b98d70be4128328c55efb98abab3f732a68955475901ffcfee225be5fac13fd9230fb0fe9ab3cc1ed7524cc6ef8efb3f8b51b6b1b2c9eb078b29243d74a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          4d6e17218d9a99976d1a14c6f6944c96

                                          SHA1

                                          9e54a19d6c61d99ac8759c5f07b2f0d5faab447f

                                          SHA256

                                          32e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93

                                          SHA512

                                          3fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          312B

                                          MD5

                                          3a6bf69674f920799397dc737ae7bf26

                                          SHA1

                                          545f74479ff6e169168e88ad8b5a545641f7cd08

                                          SHA256

                                          ae5e8d8fc6584dbdb326406bdd8afe3d668c74e904129083267e4d6922664cc6

                                          SHA512

                                          202c09a7287e417d11153a764e0425139ee2893bf983ea4781bb28340b17d85d3e0ae0ae1c98d44fb21d3c9c40156f4fd91f8a16d8c9fb0c8230978ecd2a1de7

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          0b9a82f83b86698ab771db26a47b1259

                                          SHA1

                                          7496c3c70928cb45c277b0fc870467a3ab3edff6

                                          SHA256

                                          83eea0e886ec04cd6878e9cbeaff72894ad6d2dc15ac3e92f14055bdd9c1fbd1

                                          SHA512

                                          794aa2315ddacb90612787e281aedfd2a916d0b0c321f3abd518cd17044bd178819a285ae15fb6fb220715047c8b738f42da1dba96910ed9e9cd8a1bea22cfba

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          111B

                                          MD5

                                          285252a2f6327d41eab203dc2f402c67

                                          SHA1

                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                          SHA256

                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                          SHA512

                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          4322244e353dd3c6a0fed41fec4e4be8

                                          SHA1

                                          11a876c8fd47ef8a791ac7a3bf12c0cb8d2c25c4

                                          SHA256

                                          c59338350296abffeba795b5a45e9fd4e2fcb92edb1c02406d43a5de5125e991

                                          SHA512

                                          a4ef825698f1163b351797d40a84375e6fbb0e896db9708483dead2be12e4cb0d2a8725d481a68b271ffc75c37d6123b0e8617d66e72c9719b172dbd0676af1a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          153ddc41abd953180818b19f32b41f39

                                          SHA1

                                          136263f363316e4bcd9d3172749e881b56fcf3d3

                                          SHA256

                                          df757452a6a26b2ccd1a830e41e828fbd112abf762b4da4dc1e31c2e9c7d745a

                                          SHA512

                                          10568ee9b6c4e7814612ea948ad06d683c42c41f8a09f18d223a93637b22bf45d87fc7facb42b4935c411ee27b25e38c922006d6c94ac8d4bde1344bb0f1f851

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          a6f39d22f073189d5ac346ef76c213a8

                                          SHA1

                                          cd4c42458d0293190b615d771b7249c9813b6786

                                          SHA256

                                          f1605a0aab1bc0eee322a4ae30f377abb3c075767d27a66ab24f0e8c261e15fd

                                          SHA512

                                          83915a6c0573f2a3d6ec6bcb4b15411af8f4cf5298ead38dd11c1546f6d4a6ea426f277106533f2ab4eeb2bbb90abb23574b5c5c94537e95b83644b9aad87dd5

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                          Filesize

                                          24KB

                                          MD5

                                          c2ef1d773c3f6f230cedf469f7e34059

                                          SHA1

                                          e410764405adcfead3338c8d0b29371fd1a3f292

                                          SHA256

                                          185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521

                                          SHA512

                                          2ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          12473df65788d3eb1ea09e8c82d536d8

                                          SHA1

                                          0f79fe8f3c8ab4ea4bd1b57e69094c8679bbc884

                                          SHA256

                                          ea46613fecc0815b5d56ab9afa330ebbbdf3d974abe72992e52de7ed4ad7df0b

                                          SHA512

                                          0ef4b177ce6c6c914727e8cb2ed28faef1aac049fe7762365bd2e733e2453891d2628af818af8a7609ac7ab93d414017a8c37a804871c43ae437cd2d06bb9235

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          cf97cd7722189b4c8af4f3db367486a5

                                          SHA1

                                          f654de5d1908395a5184f1213e4b5b33cb2b8c7c

                                          SHA256

                                          a5a6f06f5d9ada7a99be5d835072f7040df189989e963880cd977ed0604d849a

                                          SHA512

                                          04e0dc98d251e6fb9fdf45b8de92fccffab1c77c085235f66bc90399bfb76e94a36e796f2303abe32cc69bd99dd96d7e8a993832185a0596250f4f9139b1c72c

                                        • memory/4648-234-0x000000001DB30000-0x000000001DB40000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4648-238-0x00007FFBC1C30000-0x00007FFBC26F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4648-239-0x00007FF476A20000-0x00007FF476A30000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4648-240-0x000000001DB30000-0x000000001DB40000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4648-241-0x000000001DB30000-0x000000001DB40000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4648-242-0x000000001DB30000-0x000000001DB40000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4648-243-0x000000001DB30000-0x000000001DB40000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4648-245-0x00007FFBC1C30000-0x00007FFBC26F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4648-232-0x00007FFBC1C30000-0x00007FFBC26F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4648-233-0x000000001DB30000-0x000000001DB40000-memory.dmp

                                          Filesize

                                          64KB