Resubmissions

25/02/2024, 00:40

240225-a1fjzshb97 6

14/02/2024, 01:54

240214-cb3pbseb2t 10

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 00:40

General

  • Target

    ReShade_Setup_6.0.1.exe

  • Size

    3.5MB

  • MD5

    a3806058c04e58965116bdd546114097

  • SHA1

    257df8a18405a5b9c0907dc0f98eba8db00baddb

  • SHA256

    293b4e2a879ec1c2eeb8f7c948f49d7e4cc5c3c0a0637d476bd9097f7e91b52e

  • SHA512

    bf3de0a07cf2aff185e0f3346145c6bc6d0bb23f7f97e61e6318cf179be8573eabfa3c683ba6a1201f4f0783d9260978e39a241e782c48f52638aff96defb8a1

  • SSDEEP

    98304:4RTF441kFuTjA/ziJS3LgnFXhmyQmVmvuEedd6Sn:gL1EuTjkiJS3yFXEytVfdV

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ReShade_Setup_6.0.1.exe
    "C:\Users\Admin\AppData\Local\Temp\ReShade_Setup_6.0.1.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2400
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67f9758,0x7fef67f9768,0x7fef67f9778
      2⤵
        PID:1720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2400-0-0x00000000010A0000-0x00000000010DC000-memory.dmp

      Filesize

      240KB

    • memory/2400-1-0x000007FEF5390000-0x000007FEF5D7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2400-2-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-4-0x00000000003E0000-0x00000000003EA000-memory.dmp

      Filesize

      40KB

    • memory/2400-3-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-5-0x00000000003E0000-0x00000000003EA000-memory.dmp

      Filesize

      40KB

    • memory/2400-6-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-7-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-8-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-9-0x000000001D5B0000-0x000000001D5B1000-memory.dmp

      Filesize

      4KB

    • memory/2400-10-0x000000001D6A0000-0x000000001D6B0000-memory.dmp

      Filesize

      64KB

    • memory/2400-11-0x000007FEF5390000-0x000007FEF5D7C000-memory.dmp

      Filesize

      9.9MB

    • memory/2400-12-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-13-0x00000000003E0000-0x00000000003EA000-memory.dmp

      Filesize

      40KB

    • memory/2400-14-0x00000000003E0000-0x00000000003EA000-memory.dmp

      Filesize

      40KB

    • memory/2400-15-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-19-0x000000001B0D0000-0x000000001B150000-memory.dmp

      Filesize

      512KB

    • memory/2400-27-0x000007FEF5390000-0x000007FEF5D7C000-memory.dmp

      Filesize

      9.9MB