Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 22:52

General

  • Target

    r.rbxm

  • Size

    16KB

  • MD5

    4ba68770e1ef7c45fa91be941ad26af0

  • SHA1

    10b51d3207db5b55548b6eb131918c3368e7cfd9

  • SHA256

    bf2b00c0db85aaff70aef27c502fc449e04101db4c267fa0bb2f4bc8a6896d7d

  • SHA512

    7f5385813d19c025283aa3114df982b8603e9b5623057206dff08eab7b35e5a8012a6b139072b60c50cf48d0b4dff3ae3216101ab8a701a3ef58c7ec311fee97

  • SSDEEP

    192:53Ehhj8/wPIlZIfb9meCa1W002ISOjY9b4en9zbqgyuFhgQbI+CJ+LUCaU4t+:wq0IIfpCao002ISOUbXvqgyujNdLUlt+

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 58 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\r.rbxm
    1⤵
    • Modifies registry class
    PID:1400
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\r.rbxm
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4848 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3688
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3304
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0xfc,0xf8,0x128,0x7ffbbec49758,0x7ffbbec49768,0x7ffbbec49778
      2⤵
        PID:4500
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:2
        2⤵
          PID:1448
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1976 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:8
          2⤵
            PID:3164
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
            2⤵
              PID:2296
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
              2⤵
                PID:4776
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1912 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:8
                2⤵
                  PID:4288
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
                  2⤵
                    PID:4440
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4876 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
                    2⤵
                      PID:2268
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:8
                      2⤵
                        PID:1776
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:8
                        2⤵
                          PID:1008
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5156 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:8
                          2⤵
                            PID:412
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5068 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
                            2⤵
                              PID:4756
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5592 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
                              2⤵
                                PID:3560
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5752 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:1
                                2⤵
                                  PID:1636
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:436

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                  Filesize

                                  195KB

                                  MD5

                                  873734b55d4c7d35a177c8318b0caec7

                                  SHA1

                                  469b913b09ea5b55e60098c95120cc9b935ddb28

                                  SHA256

                                  4ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d

                                  SHA512

                                  24f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  168B

                                  MD5

                                  d6f014285d2831a145cea8bfe087278a

                                  SHA1

                                  c21588da33c7c871c1c21dab695006c44ca8d601

                                  SHA256

                                  b229ac94a43bb26fc30baf0cff9a801f6958eeecab559a14c1ce2b5dfd8bb8ab

                                  SHA512

                                  bb6a3eb3f3c7f333795b43b39dfc2a39e29c1a7607d96f564f2a247089830ef07fe3552237538ce7fa5c434e572742cfe274e82c1a5f4da0d486a904a679b888

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  168B

                                  MD5

                                  cd00adc826a1af98967ee8f791142c47

                                  SHA1

                                  de18285ef24ebe4a19ae9ea73dcf163ec4c8efbc

                                  SHA256

                                  7b7c6b0c614f3980700bf05b30c9a1b960d97caeb969db372e371c1552bb3d66

                                  SHA512

                                  491b8ecf300cbc02e65d01e0b730ef182a99677c094c0b59ac29cf2cacd0ac497721b7d8a7588231b70cb6b3bd480edfccf3b2621e570ba0810ab6a1e37eb08f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  524c4405739f12e4048eb0484f277fed

                                  SHA1

                                  a33513ebd80bbb964e4722317404065e857749f3

                                  SHA256

                                  e5eee53296ff2b8fc3efabf0c01310d2461d6830889bbe12dcdc6f11bff93e17

                                  SHA512

                                  547d1db221b5a21addb7858ae5501302eb3bcac665fcbc75edcc1280060d39c9e8b0f255eab6c633d9ded2ea779460ca0745e3c92ee5024ac7c5eefa869a8f81

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  371B

                                  MD5

                                  ce588c48d03b1f624a5edc2b0d5882fa

                                  SHA1

                                  b01b30e43262d140f2eac77a616c6ff0fdf6fd77

                                  SHA256

                                  f31c1e51a84dc463e699ff954f8da11e494eb876def3b275c3902f040fd3a186

                                  SHA512

                                  49e25691d6407b606df59262422b79b479252fb7db7cb1502b9dadc75def7aedcebdd4b6342599f33e24e9e28cacda88d2c491b0d31ee35fadfc5796bf0255a4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  504b9b5d39ccffc4f69ccaca798b0d02

                                  SHA1

                                  b5b8ef4946b184fa7068e2bf85b8b0c4da164ab9

                                  SHA256

                                  cec5420bf599028e2afb637dce07388768525ab858209d8a25d0b2af0cff2a24

                                  SHA512

                                  f14d936d4008ed353af2623d16ab67aaee315587cdd322e59160e06d35ef70f1dec77a5d30d7a895e8124d46f6fb2b49df78687a6103af6a9f2130f3bb76393f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  dacd25d29c71ba0d5bd78f6338362e19

                                  SHA1

                                  3f09109163cef94c90b0d94e8efa973dfaeb0455

                                  SHA256

                                  18fd28c392a87cb028743c9ab02bd47220f09b7b7cc6c4b8596e0d8ff389db6e

                                  SHA512

                                  e585c47d045178fed11a6c4a54beb56eee9ebd00c9dbe72f2c2543924f0c7d247d2bfab4fd8f44a9c3119b9d4e82132638142a534efff0c7d7db3a55ae55b5d4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  15KB

                                  MD5

                                  2e004e39314f991c76e6f450e3138c65

                                  SHA1

                                  ca11741f1e1fef4470c565f08e9fdf4ace23fbd3

                                  SHA256

                                  1a0c65c2669d0d0b6ccc2d896c732e17a6d27ae5d43cbc7a6bc2dac16e382b14

                                  SHA512

                                  3bea570cad7e4da4be14efe0fa71a87b08cb5a9b2351f9001fef9457ae470f813019cc0c326cce0335d586ade6a88bd4bbc858197dbf2e72dc4e709d1627f1e1

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  254KB

                                  MD5

                                  7be44d296563c9455db69dc669af1b33

                                  SHA1

                                  d16192b59cb2184c250a8dd5cb7ec8fb4cca827a

                                  SHA256

                                  ef9b16c5ff16527bd1c0a9f03a68bddadcc54bd0e34059303288bdf833755f0b

                                  SHA512

                                  123d254dfeda8b6f7b5af02dfda62aed01401f93f86d84ad9c5d855bd50187325e14408b306d65070302fc166adc91ee31a521db8ad8fed8d40ea0ddb52f77d8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd