Resubmissions
14/02/2024, 02:49
240214-da345sgc96 8Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 02:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1198372428271853733/1207156007545995274/decieveing.exe?ex=65de9ea4&is=65cc29a4&hm=c69e25c797dc2ae7adcd36d5d2912cc78b38c47264d7a32b64b23e5e20014529&
Resource
win10v2004-20231215-en
General
-
Target
https://cdn.discordapp.com/attachments/1198372428271853733/1207156007545995274/decieveing.exe?ex=65de9ea4&is=65cc29a4&hm=c69e25c797dc2ae7adcd36d5d2912cc78b38c47264d7a32b64b23e5e20014529&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 556 decieveing.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523526793785835" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe Token: SeShutdownPrivilege 1984 chrome.exe Token: SeCreatePagefilePrivilege 1984 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 556 decieveing.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe 1984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1944 1984 chrome.exe 81 PID 1984 wrote to memory of 1944 1984 chrome.exe 81 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 988 1984 chrome.exe 86 PID 1984 wrote to memory of 5584 1984 chrome.exe 88 PID 1984 wrote to memory of 5584 1984 chrome.exe 88 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87 PID 1984 wrote to memory of 5696 1984 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1198372428271853733/1207156007545995274/decieveing.exe?ex=65de9ea4&is=65cc29a4&hm=c69e25c797dc2ae7adcd36d5d2912cc78b38c47264d7a32b64b23e5e20014529&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ccd49758,0x7ff8ccd49768,0x7ff8ccd497782⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:22⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:12⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5384 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:5212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5432 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5744 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5092 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 --field-trial-handle=1868,i,6778716906691473212,11390134028738598218,131072 /prefetch:82⤵PID:5652
-
-
C:\Users\Admin\Downloads\decieveing.exe"C:\Users\Admin\Downloads\decieveing.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5529fec623e91827c9b18a0b408e79b1a
SHA1451a194aac752b0abf89c798fc9cdb856b40feff
SHA2560ea2e33873fe345dcfc4db7b444cea5e60b87036e7baebcdb3d27f1aa636dac5
SHA512561e501a3e326869c1249436f1d88f9d249211cf9020ba5575ef9133a289aa877d5b353f07f423b616172e96b10084ddd190850bad2d37248f4458db8b0880b1
-
Filesize
6KB
MD53adcc14aeac7874d040fd2e502671d38
SHA1c56562639ef8cd6c73ed850b46024246ffac6707
SHA256cdeb0e3a2b3fbe9ae0cefaac0f42064063bd937ec08fbbf6ad36108a3cebd33e
SHA5125f574eb46bad2cb6a78ab8a80c34b30ea9d7aa80e9d5ffddd6f6dfe32bbc73d5793a55982dfc6031a42f60d8b2025535ba9bdaec2561f18819d0ea3ecd43f1ae
-
Filesize
114KB
MD57255a5d477d6630476f86118c8c1294d
SHA19c329828538f2bf192c53c4bffb609a0158b3084
SHA2564b7eebd08bb1f55373b3cc83bdff5f49fb20d6d6174f3dbd8c64238640e1d7fa
SHA5125438f124192c1d6e77cd62e270542fab4a5dcc9b6d95ef28f69f099fcca5cb418792f15df025d2b2a591234277db478ff9dc75ad0e0cbc5b9519442e23198d96
-
Filesize
114KB
MD527113c0d4aa9085a9f0f0f62850929bc
SHA12c2643f1f0b120834a5adc690650344df022ae1f
SHA256d639d7e9bd03ce4aac7be4d18f2f23b1ec4c6d7dde8e1b73c50f77a741e5b4de
SHA5124cbc5f08fdafe77aa5fd181ff952c74dee1d4db4ebf21e93fd249a144889a9a6a0925375daba15e562da637fb039aaa9561c0d68d8ffb6e505a7953c1289a33d
-
Filesize
107KB
MD594a0c4d132ca6622bad611928305f4b8
SHA1607dbd4690bd3c4cd10760952df4c1edaaecdc0f
SHA256bae9a96fc682cbd0e943ec7bb60de007d840a1664a9b8a43b62110dc85e448f3
SHA5128402fed6f4eb7030a59ed4dcad732dd68d45d64c6af200d668839006f4940d51d482e8665b800ba8fd67ec831998ae2dcc3f7d2c265a1b842f70114e830e1c5d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
86KB
MD581020a9a14fde04d85096ad8915138ce
SHA16924aa9b0bac4edc307c8cc2b9238b77bbd42c37
SHA25646fe79c0cc8162de4cf696ab4aaa5989808d35f8d2936ceb7cdf7736b479576d
SHA51276cb4dd282f30d539d18bd36ee00455ce2e3bd78c77df3c3ba546152fe3e4e936f61bd9c6bce8e7617430c81c06d0a1866903119e374a369eb1c6812954b347f