Analysis

  • max time kernel
    1792s
  • max time network
    1802s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 19:28

General

  • Target

    chromewebhelper.exe

  • Size

    797KB

  • MD5

    e3b8b6e5e354fe993459d9eb0bd1ee3c

  • SHA1

    cc2c9c7020fc79e1f46974a13e6ca3f14aaaa6d5

  • SHA256

    5499a64317fd7fa44767bd4c10ad4803115b00b4ea36bde635b130742d432de7

  • SHA512

    43ca2a53aaac526f1ad143d19f4f3f1bd09f5d7ba91ecbb08b72a38e2e64f920e7bd0ce2240af97e13ab66b6e7f189279fc02c037d48886cace5840159b292e5

  • SSDEEP

    12288:kZrULMF1bEdXSD0v9qvVvm/G3FBCBLyPYe6qFz80COFuw5nMtpnHYhaa:kYMrbGXSw9q1m+qLyP1r80CO/5nMXnC

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chromewebhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\chromewebhelper.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\chromewebhelper.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\chromewebhelper.exe" MD5
        3⤵
          PID:4772
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:412
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:2816
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Checks SCSI registry key(s)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3136
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4264 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:3088
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:4304
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
              1⤵
                PID:1136
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3936 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:3604

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Microsoft\Edge\Application\delegatedWebFeatures.sccd

                  Filesize

                  17KB

                  MD5

                  7fd9cd05f23d42fb6deda65bd1977ac9

                  SHA1

                  df25a2c9e1e9fa05805da69ff41337b9f59755fb

                  SHA256

                  ca6c469655d4d0d7ce5beb447dab43048a377a6042c4800b322257567ac135d9

                  SHA512

                  6ae8addf0c55058803305f937593ba02202c99639a572be0cacbfde598019cf8db7067e0392bd66c43cf7d8780e454ec5e08d68bcfd491b60a450ffc280c81b8

                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.VisualElementsManifest.xml

                  Filesize

                  441B

                  MD5

                  55b0d9bfa7a495b65309b336c1745003

                  SHA1

                  e0b8c26a8048cb4b98c5123850a50fa588296035

                  SHA256

                  447f8465aa51ac848341390e3ffdb6f691ddc307719e78734517105190754823

                  SHA512

                  d2ff574cbef783a9bce1e0c05b3489d4957db48bd0867787cd40c2c89dfe15b4838554f9a05651894faad2488bc265604621e15ae1f304eb2f4b2997b2432ba4

                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe

                  Filesize

                  1.2MB

                  MD5

                  a4426e6c815ee0e47ba36c1b59cfc719

                  SHA1

                  6444c7e0442c9bc665e68d2f8ac3be2e9c0d5cde

                  SHA256

                  fb14185282a6c7497b5ad494396c85851118dd3169ad3ef25b289f7566249336

                  SHA512

                  35cc2de20b6c3a8f9197cbbd83e4eb8d06478bc49a2b471a1bdde41f022063bbcf194fde3f2e9a316394660ae9c58e427db14915114f69dae6128ed25d66925b

                • C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe

                  Filesize

                  1.1MB

                  MD5

                  5c8f2b3cb7efaa2f9e2ebbb8adb000d9

                  SHA1

                  6a55448ebe20f2e95f5ec3ed54764fb6711d209f

                  SHA256

                  3a33f5bcc132091b06d393a398d7812eec7ef69c4ef4e1c0d9905b9168644da0

                  SHA512

                  704cd1d92bffcb18ba47072ee0148228395c94d772a175dd0da07c72799b036251bafe775bc49fbaf9143ea73d3a0b55193c8f37d04272a6f63d3aa0d5da092f

                • memory/1716-1-0x00007FFCC1390000-0x00007FFCC1585000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1716-7-0x00007FFCC1390000-0x00007FFCC1585000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1716-17-0x00007FFCC1390000-0x00007FFCC1585000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3136-26-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-27-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-28-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-29-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-30-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-24-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-25-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-18-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-19-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB

                • memory/3136-20-0x0000023533B90000-0x0000023533B91000-memory.dmp

                  Filesize

                  4KB