Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:17

General

  • Target

    cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe

  • Size

    1.1MB

  • MD5

    fc157bf81ab006d1bb0a542aaf499c53

  • SHA1

    2b5f22ac2158a90eae8783e05e62171095bbdce7

  • SHA256

    cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909

  • SHA512

    723f661b13ed7cc9444ba0c1038b2db23716bde32ef02f504131a4f11e5a23a9186ec527c0d9291f18194e7193d62687be1f2a5385ffa37d3b1ea95aaac2f8f8

  • SSDEEP

    24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aHh2+b+HdiJUt:CTvC/MTQYxsWR7aHh2+b+HoJU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
    "C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3324
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffbddb59758,0x7ffbddb59768,0x7ffbddb59778
        3⤵
          PID:3572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
          3⤵
            PID:3352
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:1
            3⤵
              PID:2044
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:1
              3⤵
                PID:3144
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
                3⤵
                  PID:312
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:2
                  3⤵
                    PID:4040
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:1
                    3⤵
                      PID:4476
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
                      3⤵
                      • Modifies registry class
                      PID:764
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4772 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
                      3⤵
                        PID:2744
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
                        3⤵
                          PID:4440
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5612 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
                          3⤵
                            PID:2100
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:8
                            3⤵
                              PID:4336
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1860,i,9679619311865948379,12587272497107969523,131072 /prefetch:2
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2652
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:4424

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            312B

                            MD5

                            008cb8590d198e72c8f92814d9dcb8c7

                            SHA1

                            b407e2d845b52fbbf48c997d90db69d640f4fc26

                            SHA256

                            2b005ef0bc35b34175922e9a95a55af81ef02c0e6c2c326ac25c36eda311f3f2

                            SHA512

                            ed172bd3f6fad79c22c33c87d8b518e2406b09364636464a22e690dc98ff33ba4d72b100108897d3ebb7ffb75770c3755dd88dad71623c71711f34d3b0214272

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            d3d559766e57c1c847e6d296bfd88795

                            SHA1

                            dc70b31785592ca700eece40dd5911de244b3844

                            SHA256

                            5a60c52c06871195046da953881dbe49eef5c3d6c4c565c2c6ee3b5d5010c9fe

                            SHA512

                            f1128f859c42ecf0df1f7c276210d713c7ee7462d1822d0f2b33f9633ad2cbb5d8a64cd4f92b78e23284f899594e67b218322df948d235e7826a8136a33b7132

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            da26cded3c0265b9f62a4cf0111ff5c1

                            SHA1

                            c3df52cdd8dc0723a4846b65996e16403f92fb80

                            SHA256

                            6af3e4da90d0c0e9eb57f3fa4592e698fd24dc84259dfedc8bd72094953633d0

                            SHA512

                            daf7617c6ba3271e07f8c883676c4bcc48ad4997e79e252710c2f9a030c379a3c8d934f6c8e80d89dc652c4e9b0eab78aecd6873cc7ebf3013bd669cae1423f8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            369B

                            MD5

                            a542a4662238c6412e455f3d55b78d6d

                            SHA1

                            16219f085a7d8a5c0424ae7c626e42731a779560

                            SHA256

                            3f63694450dc0d800268775d1bf85fac87f848146651d0f6102a5513c0fe6902

                            SHA512

                            04ce748c856d226b84d000670f9d02b73a676b6e586b94f615ea5de4d63de101cc0d4bf31c708b577506522cbfdc67e6411a1c3fee5685d9b982c6101430cee6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            369B

                            MD5

                            b37f87556c9238f98c49836b1b89d855

                            SHA1

                            94b186b720d371ac76b4e9b141911f394960b7b8

                            SHA256

                            61647321da955440a1c9d7c8037e2356beb1626b246be44c92bc8eba29b2ea1f

                            SHA512

                            0e17d8b80c4ef09382f5ca932c4b1d99093957f327ad254372a870a25d69fdaba7ecf7d0a1bb035f80c5ac20402ba5b9666126b0714e181b45a0a3db48de3dbf

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            157be46396049771a50da94a1ecc94a3

                            SHA1

                            0bc0eee463ccad22694cda7a53ad9abe1813788c

                            SHA256

                            9865624a3c8bbdf204630a337a66fa8a7e88406c390def2f91db29f31865adef

                            SHA512

                            ea341c12f78282e4169c40f42f2fe81508089a5d7e4ecdec15db123611e322638502f25c83011257aeeddc4d10263cad3460aa998c68b7ff925e87f24861a77f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            af34fcafa88d4fbeb44f571c78382682

                            SHA1

                            a6d726a43e0550827987fb547b3ba14b86adc68c

                            SHA256

                            73528aafd2484a5377390eabef2db8290e83764a5a1e39a629914bff5e206448

                            SHA512

                            77b61d14654b11f8b4693a46a1619d928921c9cb9f84faecdb385bcffb41c0eef02ad6f2f0e23da7344fe2d14595fae34436bc29e8d4a1141f8ee124234fbc14

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            171KB

                            MD5

                            7dac771f4afbecdae8dc3948fc10e7c0

                            SHA1

                            ee028e9821a2fe095db57d477d6ed42d6669d583

                            SHA256

                            b38afd3dfbfcf302540697df3e7584fc3c56832efb9ca40ce62f18b739a171d5

                            SHA512

                            5d27fee492aa591310ab4a6ef301d749871fc8332bc695f5cc60b885c6a61a8da4aeb672764905d7b9846d1845bc20825d3a189caaf4f23a2a117723270a6731

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd