Analysis

  • max time kernel
    60s
  • max time network
    63s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22/02/2024, 01:19

General

  • Target

    0day.exe

  • Size

    68KB

  • MD5

    bfa550450cea14224885b0f0b740a6d2

  • SHA1

    ec1db5f03676b38a5d75376948a7251c2d0fd9bd

  • SHA256

    0ce864eb7ce80d4d8b26403edfee770d6727ac2aa74f5bde64f93b4f8fbe9e4e

  • SHA512

    d3bacdec0824cf1359734713331a47a6b9185b82c0cf360dbf37a776b15ed463ebb8c267f184f42b4f3b2e0cf9a0f0983a3de8d0efb99cfcb827e60df7fc8725

  • SSDEEP

    768:tbLiwyyqehg7RaQ3qUjBnJSMMOQxpAi9Hm:tniiq0gdYUjBEfxplm

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0day.exe
    "C:\Users\Admin\AppData\Local\Temp\0day.exe"
    1⤵
      PID:4732
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb8c29758,0x7ffcb8c29768,0x7ffcb8c29778
        2⤵
          PID:3572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:2
          2⤵
            PID:504
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:8
            2⤵
              PID:4604
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:8
              2⤵
                PID:4236
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:1
                2⤵
                  PID:2324
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:1
                  2⤵
                    PID:4576
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:1
                    2⤵
                      PID:496
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:8
                      2⤵
                        PID:744
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5084 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:8
                        2⤵
                          PID:772
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:8
                          2⤵
                            PID:3524
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5148 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:1
                            2⤵
                              PID:4916
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:4848

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              369B

                              MD5

                              c4b6ed687640f2e15946b3a8a8cb5a76

                              SHA1

                              167d92d03a18b4591be6eab4f190f909ee255fe2

                              SHA256

                              2bd368b8e0ab5642d754975272334331c966fa48f8d525605b2743645ed0063c

                              SHA512

                              3d5808e7711533aad90b5598fc94b246bcba505463d77a2a77f519faff87b4b7a70c1d1eb07cba92f539f3509c6029527614c1b20a45616a1159ff7732aa8dd1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              869811a78b7ed6920652a01beea930ed

                              SHA1

                              0fefb0adad7523350e3601bed3c50aa17cd7b4da

                              SHA256

                              741cc9f85bc182f76fac97245129b483108c86356d0e1e7dd8fec5991f7aae3a

                              SHA512

                              93284c4682fdc860c65651cdea86902e4943c6d6a22ce44f2249e1a30fb513c309b8a1191683e1802242c10e46e44109e0c0602c6d291e82d81d3447c9a10889

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              256KB

                              MD5

                              b6682e9f9870ff25a1a9196b54f22b02

                              SHA1

                              61456bbf045d84fe42bae2e44d8b13fa95e3af0c

                              SHA256

                              7495143d4edcae549468fc29fbb1047af6310fe49de585c339b80c943e350437

                              SHA512

                              ab6b6456f4f14675e2a19ade885546feefb2f32221d799a7d2231d7ad2e529a6c719b2f58756127350140eb9af6209cfc05c62c7edc8a0007e82661a1135ca60

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • memory/4732-0-0x00007FF60FA70000-0x00007FF60FA97000-memory.dmp

                              Filesize

                              156KB