Analysis

  • max time kernel
    65s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 20:15

General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbVJzOHZYcEd2dHBGZmF0Ml9PLXV2ZGFyUC1iQXxBQ3Jtc0tsb1RqaTV6YWtrVEtFOG1fNlQ5UDdMbl95aTU3eXpXR216d1pqMXRVQ3kxbkNOc2NLV3BYTDhYdEo1Ymw4UXZwT1dBSmxFenZwUVdOY1RBblprU0o1WG0zc1dVOXRXQ2RIR2JEUGJ4VmZGNDU1WFdscw&q=https%3A%2F%2Fmon.im%2Fbad_apple.exe&v=EZpZwunMzuE

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbVJzOHZYcEd2dHBGZmF0Ml9PLXV2ZGFyUC1iQXxBQ3Jtc0tsb1RqaTV6YWtrVEtFOG1fNlQ5UDdMbl95aTU3eXpXR216d1pqMXRVQ3kxbkNOc2NLV3BYTDhYdEo1Ymw4UXZwT1dBSmxFenZwUVdOY1RBblprU0o1WG0zc1dVOXRXQ2RIR2JEUGJ4VmZGNDU1WFdscw&q=https%3A%2F%2Fmon.im%2Fbad_apple.exe&v=EZpZwunMzuE
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2d619758,0x7ffc2d619768,0x7ffc2d619778
      2⤵
        PID:1628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:2
        2⤵
          PID:2928
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
          2⤵
            PID:4288
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
            2⤵
              PID:2660
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:1
              2⤵
                PID:5116
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:1
                2⤵
                  PID:3632
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                  2⤵
                    PID:2004
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                    2⤵
                      PID:5088
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3792 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:1
                      2⤵
                        PID:4888
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5356 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                        2⤵
                          PID:1140
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5380 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                          2⤵
                            PID:4356
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                            2⤵
                              PID:432
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3076 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                              2⤵
                                PID:732
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5564 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:8
                                2⤵
                                  PID:4580
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:5060
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:3064
                                  • C:\Users\Admin\Desktop\bad_apple.exe
                                    "C:\Users\Admin\Desktop\bad_apple.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    PID:2084
                                  • C:\Windows\system32\AUDIODG.EXE
                                    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x410
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3792

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    13ade3186a0fd4b8684f8fa2ed2d0aa4

                                    SHA1

                                    1714aa1892fe4b9f0e86372574049dff55371c83

                                    SHA256

                                    1e14b0d9f5303cc3a507aec801d2bb9f1d76578d7a546590cb00693d69814b6d

                                    SHA512

                                    b57c74d368d0d5381b25ddbf4ac09add3e81cb638db0153e57fbd855c02064313e314d6ba90876502308bfdea1c46576f5e76c016db574d0176d8b0d138765a7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    537B

                                    MD5

                                    f9d87407fa86fe8566eb9e37d2941969

                                    SHA1

                                    dd3f7bb2d034be12d1667199d9377a509a2b2237

                                    SHA256

                                    942171195fc2f208c47c8952c0f6332f7193bd1210f87e4aafa981864902f3a5

                                    SHA512

                                    192376e15578764a2bfdcacecb4ee185bf7fe23a466edf6233e798a7e8239049e8f0e1f6cb3976fd682bbd1cad546efcbbb35a68503f1ec8baceeccf3689cbee

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    67535643514c50ed45076ea04604011b

                                    SHA1

                                    8513d3fd1b5f18e1ad9d15e137e6de21c074c44c

                                    SHA256

                                    7d3cade247bb9f549b3d219e4516b0ff02909536029e19b8c66b0d277b9fbde9

                                    SHA512

                                    a1fd2949bcbe0fd9f327ab5b95267f96a2195a11383133d39cf5ea14c92e449b1816a86b14a990fd590c8789bc63d07d9f289e495687264ff694e8246e172a92

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    348ec34b012291a4b10bd6dbf9a0ee7b

                                    SHA1

                                    ebfb0d494d797f3ca51ffaa845be2c22d918ab37

                                    SHA256

                                    8e5a0021d3f252ea80bafe8c1731a1c0bab322ff18620eff9a6b21abc78522ab

                                    SHA512

                                    e62457c44d261746902dc857d7908ea3bca02396342fcc2ba71f46b202ec79425d711b6e4ff8d4010c47a74e9b8f13bdfcf75207dfcdbdfa246718d4e1e30b4e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    128KB

                                    MD5

                                    1215b52e74c56a111052ca9944b8f60f

                                    SHA1

                                    01c0a2501ea94fb7555bc0e30c8428855b1fb617

                                    SHA256

                                    ae2c01a596e373cc68f4a0a6e1b1da5b1a8bdd0e42e19419ad0cfffbb163970a

                                    SHA512

                                    3b44f658097ba744ca52d819bf2e8fd47bff489f0d495de94cf99c0430a6c0a19a9e19f5184f31058b09709d5fdb9a982db8d37c819144ab2f2d881b7ca48a5a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    128KB

                                    MD5

                                    6b9c5884c664a7f6056e649cd1d8d02d

                                    SHA1

                                    01e798d77407d8a16edb364b87d720877d36a216

                                    SHA256

                                    cb2e00efe2d74a962a732f22e0eefcfc821aee5de44207615e0495b5d2e8429e

                                    SHA512

                                    58ebdb617f304dc2c95403f1594a78230e3bbd97913d2895633f61da8cc3fdf529cb49f8f721d7c3e02dc8f568c3a688af63dd36bb6942dc77a2a13b42efdd97

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                    Filesize

                                    2B

                                    MD5

                                    99914b932bd37a50b983c5e7c90ae93b

                                    SHA1

                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                    SHA256

                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                    SHA512

                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                  • C:\Users\Admin\Downloads\Unconfirmed 100454.crdownload

                                    Filesize

                                    4.8MB

                                    MD5

                                    6a022e937a774f6da038da4634b0fc40

                                    SHA1

                                    f204d69f3a78629a85f10bd7d2768b6fc3cbd7db

                                    SHA256

                                    6927cb7245652a3b66f1a4517189c7cd08056875e09e267a29fe13f1d3bd4d1d

                                    SHA512

                                    752643d0bc50dd82d7cb82dd8e7acea72859a1f57eff9635fcac0950e73bc2fda1228e8e1405a6cc92ea364f8026e24f4fb88d55f5e92bfe82214dffbe76ca4d