Analysis

  • max time kernel
    1792s
  • max time network
    1793s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/02/2024, 15:54

General

  • Target

    ChromeSetup_v1.3.87.369.exe

  • Size

    3.2MB

  • MD5

    3a1c8cccaf96747bc5d4a0cbe221a9a4

  • SHA1

    d5641fa2764a6b36ed79c5155c0ddb1f204aabe4

  • SHA256

    ee93b7ef5509884b9451ea08347f2444d0a51fed2b98307f55f3ce6890a621dd

  • SHA512

    f06bf733428b292113976cceb0124786ef814bb60e02a9beb648dd0eb57855f0b0f9b36860f458a641df6d38a1b6716d45356aeb9acf8467112a97eec772dd50

  • SSDEEP

    24576:ISI4YvRO+E+hziLDDwGUhzEB7Doqs2p4Uxn8LEkymXERBaZ7R1wmGaT9yqEjb0eO:xaZaMo4JLEXKUL/H6oMla6yJDO

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 50 IoCs
  • Loads dropped DLL 2 IoCs
  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ChromeSetup_v1.3.87.369.exe
    "C:\Users\Admin\AppData\Local\Temp\ChromeSetup_v1.3.87.369.exe"
    1⤵
    • Registers COM server for autorun
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\SysWOW64\cleanmgr.exe
      "C:\Windows\SysWOW64\cleanmgr.exe" /verylowdisk
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DiskClr\DiskClr_v7.7.dll,Cleaner
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2904

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DiskClr\DiskClr_v7.7.dll

          Filesize

          1011KB

          MD5

          e4c1798dff6319fdcc5071b177c4ec28

          SHA1

          8d2c450e47515999a6ca956bb4c53e40ea929632

          SHA256

          dc50491b564dd8464d6be3b5605e0b55016acb8341b6b21ced5858baecc22f65

          SHA512

          b2cb4b502d2042c7c3593a43fd79cc760a7f04aaa0785ec114aaaa0a801cd9f26be3c36bf77956e0ca689012a41990c0b847e7e0927a78f157bf01baaba8ad5f

        • C:\Users\Admin\AppData\Local\cleanup.txt

          Filesize

          3B

          MD5

          b3967a0e938dc2a6340e258630febd5a

          SHA1

          640bacfb48aefac1f91028c01603e5c78d4f63ca

          SHA256

          02e6295d8f522840f09b5194b3f023799ad6ed3306d9296005787e792224df20

          SHA512

          ff1f2acaac6436e89901b10f7cbc94c2a7b975e4c4eac2754e5dc6f047d43c4a089286ae0841154a8e22e71ee75ac3ff23ad12b43ef62575a0ef8c5800574a37

        • memory/2904-10-0x00000000025A0000-0x0000000002615000-memory.dmp

          Filesize

          468KB

        • memory/2904-11-0x0000000000B70000-0x0000000000B83000-memory.dmp

          Filesize

          76KB

        • memory/2904-13-0x00000000025A0000-0x0000000002615000-memory.dmp

          Filesize

          468KB

        • memory/3700-0-0x00000000015C0000-0x00000000016D5000-memory.dmp

          Filesize

          1.1MB

        • memory/3700-1-0x0000000001810000-0x0000000001943000-memory.dmp

          Filesize

          1.2MB

        • memory/3700-6-0x0000000001810000-0x0000000001943000-memory.dmp

          Filesize

          1.2MB

        • memory/4092-5-0x0000000002D60000-0x0000000002DD5000-memory.dmp

          Filesize

          468KB

        • memory/4092-7-0x0000000002CC0000-0x0000000002CD3000-memory.dmp

          Filesize

          76KB

        • memory/4092-8-0x0000000002D60000-0x0000000002DD5000-memory.dmp

          Filesize

          468KB