Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 18:16

General

  • Target

    http://url:http://gandcrabmfe6mnef.onion/8b9c14fe8b0c1d15

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://url:http://gandcrabmfe6mnef.onion/8b9c14fe8b0c1d15
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2200
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6669758,0x7fef6669768,0x7fef6669778
      2⤵
        PID:1376
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:2
        2⤵
          PID:1764
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:8
          2⤵
            PID:2800
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:8
            2⤵
              PID:2812
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:1
              2⤵
                PID:688
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1596 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:1
                2⤵
                  PID:440
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:2
                  2⤵
                    PID:864
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1148 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:1
                    2⤵
                      PID:1980
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3528 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:8
                      2⤵
                        PID:2724
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3408 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:8
                        2⤵
                          PID:1172
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2672 --field-trial-handle=1188,i,10964061067703101351,8377229338119966313,131072 /prefetch:8
                          2⤵
                            PID:2612
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:2956

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            4374ea6ddc8d41242bb4122146d53d87

                            SHA1

                            d191e95c022d60774629b1114868b0cf3faa96de

                            SHA256

                            bdb5f85c7dd8956f93277017f42d7b622fbfe0e22021f611f90e2026b9323e9f

                            SHA512

                            5648eb0e97a452ef2af44c4a8c7eedec02594874aaa413ba3b4c810f474f3500bf003763e06ebb5addf55224bc36e60803cb11f7b1f5eda86f25cf7529253c7b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            f9112e640dfe080e0527fc3b68114581

                            SHA1

                            9d5046d87ba8dfe2066095b8827def97cdaca52e

                            SHA256

                            dc953faedec62951ee03917aae20c5cd2361da4aa01697db75fd95a4305808b1

                            SHA512

                            8eab4ce9f39c187078c4e51a45fffd992ee1f6263dbb8470979d46e71ac0398bf0ddf98cc9b34e5a2cbd07da7c390c283790f8a981bdb94949c1077ffa3b43b9

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            ca6fcba8a7e36f6d63fa222f6cd734f1

                            SHA1

                            f4ef7594e2d353d2a404e6cf362c0131885db616

                            SHA256

                            c014e13ebab00f0b1e98f83cb65a1d8e2f32916b70527149e70afa94a301f509

                            SHA512

                            e3ab1e2591444bf92b24e3529e7579d355e86b8866f2922c78a6194e937417c5cdd27f0b48f495540a9abdaac2c8647640360d5af4c2ccfeb21fb817ef33c2ec

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            2f368ca292e3aa02633d78be1c848923

                            SHA1

                            3140a88885eb6998fb429c8e61da1aa694a192a1

                            SHA256

                            16a3aa7b1f29c1efa22047e4f4a23b5812e423dbc00b7b14f6e2d612f428ecda

                            SHA512

                            e77af288103511e3d218de13d79ac9c0de61273c2ee0164eaac02c8da9b2c32c9fe3d33950cb1729ee271b23040ff470cafe72e0dd563eac5c8b6b92ba904df5

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            b4e04a277374d1dc57024cef1ef416e1

                            SHA1

                            53cd7d22a337d1ffb10081eb81525b1b11716844

                            SHA256

                            e46f7030a60a91a7aadd29a1aa78ae1314320490bdf1b02905bfbb02d0c7a408

                            SHA512

                            460e9fe66666b9eb48c75cb438e708ca53d6a7ce060262edbb3df826d12c631bdf53f144fda805a94d881017aec53eaaf171e4d79f85bf3b73f581c918da30e2

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            d1866434121a16b48b111b46275cf6dd

                            SHA1

                            f8b11c9ca9edfddb366f1ea0ea2872ac2984f748

                            SHA256

                            714dd170073c1701c333e4eafafc9bc501a0295d539ea91d40f9303aabc63fa1

                            SHA512

                            54c69e5a594ed0b086682996f102e1223c83d19727b14324f54818c23922c37329edcd75bc65eec205599da11c7fd914ef54aedbb1dc5ca0bcaa4578c7ef38a1

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            53796343201ac5b6a533307afc014e27

                            SHA1

                            472592162f61d2c261360193748e6503ad818173

                            SHA256

                            3f68d0b9b053f84931f73df75ed425b60b99d686a913d109561e6032416ebfe5

                            SHA512

                            b9ed484b79828a559f124b85aefda486867824d04835858ddc1a02beffdcf012b36d847f884228ad026d2f0ee0e5454a52438d692575845a780e8aa1aed4f4b3

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            ebf24520983ebd512b0f4a12a51e30d1

                            SHA1

                            feddcda5a26c5ee1c5e0cfde4a62cf642432151c

                            SHA256

                            02b83b807f48ce6eb721917c0549fc6bb53d740642b8b3e7a97d3c76144e05f0

                            SHA512

                            ee6754c0af2a0c544b610a7d16e360acadbf1a2f320dfa157c79fb74e264e87dc8e3a7037f1372953674796f1e3e1a439424dd0bc339534fb11af94de396511e

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            e0f71a496997fff57b71dbaf28e44b5f

                            SHA1

                            59a789369e3f005277f846529b948f2e04a14a4d

                            SHA256

                            d6585bba9f07fcbd35bb974b9de44dffbf8f07ad7b11c2d506d2db742742d76c

                            SHA512

                            d7593ce0d5ef5d725db0bf19065368d1e1e4dc0e39cc8b211dfa45213184246e4e9d76322ce9216c2674f6a5155aaad6b27796911b9a8c910a3654933c15700f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            4KB

                            MD5

                            e59a29d6a04f69b2d46e4d606ca06625

                            SHA1

                            494fa5eb77e8a6eaaf63050ddf9e887ec9aeb581

                            SHA256

                            e5023b1f1633d37d0796d8240dbc31caa16aff1e7820847c539ce9956a147703

                            SHA512

                            6e0319a0dc926d2ec4fd9e1d245ca108ea4958c813a2878326bb62a0cbf4c3853f0f6ecd01c0ff502c6c3a3df6f56774cc3821b3be960b69fc1e1cc18291fef1

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            4KB

                            MD5

                            24200e25513c298b5ae207402ced71ab

                            SHA1

                            76a43c9f1edf4032cca9fe22d7fba7dadd1c727f

                            SHA256

                            7d3d6a8fa72a2e9caee4503a3bb9cd79e51f934b6538118d2d700c7f27d5cb18

                            SHA512

                            3e18172cdc76d4e0738444707b498ec7ca076aa90b5c18e42ecd5985c12d1eef3e37cca3890339e023e1041e7266ca3195f5ef9a00161d0c849d5018c84898f9

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT

                            Filesize

                            16B

                            MD5

                            18e723571b00fb1694a3bad6c78e4054

                            SHA1

                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                            SHA256

                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                            SHA512

                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                          • C:\Users\Admin\AppData\Local\Temp\Cab538E.tmp

                            Filesize

                            65KB

                            MD5

                            ac05d27423a85adc1622c714f2cb6184

                            SHA1

                            b0fe2b1abddb97837ea0195be70ab2ff14d43198

                            SHA256

                            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                            SHA512

                            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                          • C:\Users\Admin\AppData\Local\Temp\Tar541F.tmp

                            Filesize

                            171KB

                            MD5

                            9c0c641c06238516f27941aa1166d427

                            SHA1

                            64cd549fb8cf014fcd9312aa7a5b023847b6c977

                            SHA256

                            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                            SHA512

                            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                          • C:\Users\Admin\AppData\Local\Temp\~DFF775D95935FB6F5B.TMP

                            Filesize

                            16KB

                            MD5

                            157ef8217d0f27f640ed7e36a52d837f

                            SHA1

                            4fc9f4ce1c30bb53dcc3d8f81d2a441794fd08f1

                            SHA256

                            81c8e1d4ec9ee9f19b0a45f4ef248ce1243dccdf78bbe0ff254a31776a6e0506

                            SHA512

                            88e5ac64712941356dcadfd9215e9cb1cbae572b888fd318050f9e775e48b5b1fa582200bd16e1c27ffc40fe4abc373bda64fb9c5caf146984bf044d3d44b25b