Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 05:17

General

  • Target

    cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe

  • Size

    1.1MB

  • MD5

    fc157bf81ab006d1bb0a542aaf499c53

  • SHA1

    2b5f22ac2158a90eae8783e05e62171095bbdce7

  • SHA256

    cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909

  • SHA512

    723f661b13ed7cc9444ba0c1038b2db23716bde32ef02f504131a4f11e5a23a9186ec527c0d9291f18194e7193d62687be1f2a5385ffa37d3b1ea95aaac2f8f8

  • SSDEEP

    24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aHh2+b+HdiJUt:CTvC/MTQYxsWR7aHh2+b+HoJU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
    "C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb794d9758,0x7ffb794d9768,0x7ffb794d9778
        3⤵
          PID:4604
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:2
          3⤵
            PID:3004
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:8
            3⤵
              PID:1964
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:8
              3⤵
                PID:3768
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:1
                3⤵
                  PID:2996
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3264 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:1
                  3⤵
                    PID:1768
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4680 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:1
                    3⤵
                      PID:772
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:8
                      3⤵
                      • Modifies registry class
                      PID:1244
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4868 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:8
                      3⤵
                        PID:1624
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:8
                        3⤵
                          PID:2420
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:8
                          3⤵
                            PID:3624
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5196 --field-trial-handle=1848,i,1921372220826313563,327222887420591640,131072 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2780
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:1528

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          312B

                          MD5

                          b97cc074faa8e191818ed475d3618c58

                          SHA1

                          e4f557d9cd5e6f4a53c6d75fc9a3a202bd083168

                          SHA256

                          8275af9b9c85935c56992b5146b67fad19787d82c7f62ae66aad3fc9b482b668

                          SHA512

                          1c9a299613fad3c3492707b43555d4757b96625a0f20c36b5efbc3a9d347947f4ed9908295a54349497d8e34632ae3df96b8f936ffbc9c939d8e254ab139d6f1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          0e9debc96641fbf136d9940f99adc48a

                          SHA1

                          808dc95efc2ceb64e716d59e981fe0adb3ba0e3e

                          SHA256

                          a8f434ef7f6459b8252d4f5e2176d60d60704979db313d0d426733e0126081a5

                          SHA512

                          7a048be3a67a8208009295dfcaf53aca0708be13f83c8294ad3d2227d5698a43a10cb0e75afa2d714a8dcee1870d5eab244cc101e1b371f4646b610872287cc2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          2fcf66049b12a629858172c3db8f20f1

                          SHA1

                          341a1ac1e0f6c2bc746f4ae61a5354db33e0a7a9

                          SHA256

                          56b9ac967feb2046ce3396b66435332fb13cf87f5d02510c5218f5efbe0611df

                          SHA512

                          b21e35401aa89143e15b293f44a770c124fbd59b58a5135c5ff11e768c3d14423f7e90d0f69cb48a09ebc65fa138e430b719e5a0b73613f78aede37d65ae621d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          367B

                          MD5

                          d3b7c81a892aef5d876ea8bb55ea4127

                          SHA1

                          9658d0edc41b01002c4987b0df9f998b6760bab3

                          SHA256

                          dc42f71b47a04a23c2784a8e900ca17bd4923a824d908fa73aca685778a42037

                          SHA512

                          5d811a3f859f0f5768494353bb8b25ab9bf3e0749af04929cf958b1771195454fe7f878e1f6d75ec05e7c0c3516844298d2812f0a1be06dc14b549ffb3ab48f5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          367B

                          MD5

                          1e66d2dfec2d48424d3834abfae84217

                          SHA1

                          94e4afb227f15f663862ce059539e9bcf3b5e062

                          SHA256

                          42f9d228d1a098d68f9983728c52507d55a23232d72089b212520e3caf119f76

                          SHA512

                          9d1a8e77aae2e84628215ef939b585c87710c09354aaea2fef5d104516714ba2a32d0a0ef4322e7b8a633e83854f52c3c3ec3a7f495a650fcf81850a9380d437

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          23b3098e30ba490518965a6b4ef40564

                          SHA1

                          c384488176ac30272a7a56b7d168b9b0530741cd

                          SHA256

                          070c0b1d7582809e21c6963d6044249ba9e8630e5839ff196aa84d773eda5ace

                          SHA512

                          66c527d32d07079ec3befc6ccdb7fdd71eaa56f7871836c74aa0200e26bb4cf6765f5607a409c9e7b825dc159f5bfd0c9cf938a6cf361b100540cddd2ea5d30b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          94b0d4e215d69dd58284a1b8de3c803c

                          SHA1

                          d10a60f4636866d95416b63af6f7fe2a60379c1c

                          SHA256

                          fce69f356232341de32758eddbab06d9a838a9428c8dbe4e8cc2484239cae7fc

                          SHA512

                          69c191f840086e9d35ebf753b83d5bd621291c7af312ecb34772d6aa152a2dbda94fec84f4685d9661300453001b3b32dc48cb61b071ddfb8c114a9bfa13f50f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          f4d258ca00c828e34ab822783e692db7

                          SHA1

                          526983d91f8ba747267bf46e14eedd1c7debb6ae

                          SHA256

                          680b8cdec68b45c84169595e6720e7b985714e922dbcea3bbe9a9d79240cca07

                          SHA512

                          aade2bb060fd1f1b76489e5a7802f1828cfc2eb9a3d72c3f8d12145e5ac6f4254c7e5947fd24c13d09b55bc2bbe7a7b7eae9c3e68571eca5daff5fe87544c66d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          239KB

                          MD5

                          544500e14ed89642df0235d040e3874c

                          SHA1

                          d8323322bd49f83aafe2d5fa29ac978cca38be99

                          SHA256

                          dc7caaea1ecc39946022a53d811dbf87fd21e275d0a1495c52eb1dbc5ad07c3a

                          SHA512

                          070f06b7f547721f9fe299ed65f00b6fa5e5528671fe66ae1bd6196c7ebb477e91fb7003df2e731f9299d04b6579305271a0821f172f05d00beec68a64843121

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd