Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/02/2024, 16:45

General

  • Target

    Channel Banner (1).jpg

  • Size

    52KB

  • MD5

    285567d8177a69f77999226609bf6fb7

  • SHA1

    0543f5af660a394dae4ad9eddb4f18feeafe05fe

  • SHA256

    5ce2df8e91b0d01cc56fcc037c43a31cdc4fc4e48b906fd8b83ce8faa28fcd9d

  • SHA512

    5c66f050f558caaff850d67b04254288531b2a81aaade4dc6ff1e08e1687a1553ac5446fd1b47349a1f1ff79dc93f87c9fce24704e36fb87c6ea2f3d7665c035

  • SSDEEP

    768:C7KVhW4GH4nrDoEY3wWfLoFhisHXMfXt2Hi4o82AA2r9tQ+NCGylCASYyA/Vos:3Vk4nrDoEY3/fcF/XMQiF2r/5V2os

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Channel Banner (1).jpg"
    1⤵
      PID:4780
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3156
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8e3819758,0x7ff8e3819768,0x7ff8e3819778
        2⤵
          PID:2808
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:2
          2⤵
            PID:3004
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:8
            2⤵
              PID:1716
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:8
              2⤵
                PID:2696
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:1
                2⤵
                  PID:2828
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2368 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:1
                  2⤵
                    PID:540
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4028 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:1
                    2⤵
                      PID:1032
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:8
                      2⤵
                        PID:1896
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:8
                        2⤵
                          PID:2252
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5064 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:8
                          2⤵
                            PID:4072
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5272 --field-trial-handle=1800,i,11998456208219646394,4808644614796902885,131072 /prefetch:1
                            2⤵
                              PID:4496
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:3160

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                              Filesize

                              194KB

                              MD5

                              ac84f1282f8542dee07f8a1af421f2a7

                              SHA1

                              261885284826281a99ff982428a765be30de9029

                              SHA256

                              193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0

                              SHA512

                              9f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              168B

                              MD5

                              94d9e4f8f93ea756252605687e64cb54

                              SHA1

                              5c14646fbc92c30cb3daa98c648b34bdd39a7bfb

                              SHA256

                              0fe1e4537810560809f0a931889072cc179ea16085137beab2358a75626c3010

                              SHA512

                              2b7caffff5969fcb157069dd229369c09f61b730d2753720f05a8ffb0687a6bc18319b30543c2a397951ef52f1e23935b6244fc4659af0187e4542b892f2deb2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\564bd7e4-d42c-4184-9b4a-9c93ad3de5e0.tmp

                              Filesize

                              371B

                              MD5

                              0ad937a839a594a172155f605a4390a5

                              SHA1

                              e10deed9c5357f6664f4f6333ef2a65c6dea8f7b

                              SHA256

                              fb9e3013e2633aee89574661ebb6b05beb2ec0af5c8a3e1cfdc99bd0b8f0b304

                              SHA512

                              cdda022dcbd17b8dc3b3b9f95b9201094acd868ad273e9faccd4e31a990fc1bbc82859c914593802cb943f12c7f1f99bc931d5a5d8e938a580152b0a03a04244

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              38924c75f8f0c5a5e44cab10860ae8ed

                              SHA1

                              161a45059040110a6542194ec8cfc6005479ae4a

                              SHA256

                              8d9c884a7cd13187ec5f45e70521968a9f6effc5637fcd4255b9cd0b2337537c

                              SHA512

                              e12c75641c4a7fc6fb82810c1404c0d0127456c920c910fe4a4e318468fef5235ea72de530ba4dea9524ab68b60d8ebb388f0b520bbf33463305063ef3e0f521

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              371B

                              MD5

                              2c69f3b109aa3525b9bd6755a3257b05

                              SHA1

                              ce6c89ae7b53f81f76ab1d73566ef36bdf15d6c4

                              SHA256

                              20797daa9461a58b55b1c3c877fe937ee36d0bd848ae59e543eec9dae9795426

                              SHA512

                              be2b395b2d7a2326c7f58c2fbb2ed1ee05ddc52a39dd899ad4603b5fa7a1f57a9d9ae022d8caa3a829ccb275ec81b0e1ef09e5b87965eb095dd645b9bf53cf50

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              79ef5024434f9b62250c5f2f5e85213b

                              SHA1

                              c64696a98df48489e646961a9dc4b096e984e9f7

                              SHA256

                              8f77ea242bb1a49ce86cd632b40860f28fa75e8190c64ef436be69560e6682d6

                              SHA512

                              8627da176202c698650a85b3afc1d9552c49c27ba66ef0dbc2a35c6c20dce35164b4a09b3665026673cdf976a0f18d6d32a354cf7496d22675664b4d18a291a2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              f39576239a39bb1bf4d59a67e0b81a4c

                              SHA1

                              e47dd7cc1e85caaa3df49813fd58afb0d2c5f061

                              SHA256

                              28b5004a81ddde1ad4448c8504cf1a3e55155095e9271092d924aa5aa6455ad5

                              SHA512

                              3e169ddd9d369d5dde347d04561c7671c45583a796596f1ee7ca0e2129382f7e44543f9569dd4dc43a19fc577563640608e85c79f273da918d4a5279a3500538

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              fe1d9ee55b6bfa5d1a81d1e84877fde1

                              SHA1

                              31bdcda1be53c016601d118da8347e36e28461ad

                              SHA256

                              d6a079299eef7a0988c015a4e6aacc90f4e0436ccc9d91e964e36d2527df811c

                              SHA512

                              ec575ac13c689b1fb84f54c376120f92cc714bf17258bca8dd6af5b9cb0bbf2eb378456b9ca36944b35f86bde8262774b8d993bffce1129c0ac0ab7dd8053a4c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              6f43e0cd42472c833c4d1289a332df4b

                              SHA1

                              40aadeb9f07b8168929cd1bd2bf8aa087c58230a

                              SHA256

                              e3aab55c13deebd015f3bb20c17fb5f5446e2e7b66dd5d79ad426de8b4cbe7b8

                              SHA512

                              08204f8fedf8ef830fa1436f723f883d1d8a46af771769082ef2cdcd3ca667d0d4bc4200d7dac8223e5ccd6df7b5c5737584bc9fd327fe1418928899ca8384c6

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              255KB

                              MD5

                              8fa35bc21b5cc7bae3b78d9b58d1b037

                              SHA1

                              d9bd33924d59991fecba54e8eb9242513a5ea7f1

                              SHA256

                              0588cc3dec18da792820d3e6cca8a817c8d843271d4cf960e88a0ba105b435d3

                              SHA512

                              e3b034285bcdd9beea22d76d9db352f95f1308445686faa61863d34bcb1c861ec37367b94d261057b480afe7d37a83b00502030fe5a6813c107dd54dc175762c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                              Filesize

                              11KB

                              MD5

                              d90e784a2a95fc1d2e2199b6a907fbc9

                              SHA1

                              7e6ec69e4d899a81113a0b623f55e71ffeedeff8

                              SHA256

                              558da8426d77dea2c0be69bcca9730a7eb96bf79020b2ecda5509e1756fe4f22

                              SHA512

                              761c2722b6d75ecf2fc928f04fe5464ff275c8f6bce07ad7a19ed0e2c1660639c89ec2e38055bae1b5093937cc1d88ea3a481a883a13ee3682d3970c1cd33dca