Resubmissions

07/03/2024, 22:43

240307-2np2fahb41 1

07/03/2024, 21:19

240307-z58h1afa6w 1

Analysis

  • max time kernel
    602s
  • max time network
    607s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 22:43

General

  • Target

    https://r20.rs6.net/tn.jsp?f=001qUslQB2SHr_FjfgFNcmWp4YpdpT8G_-A3tIblwIWPfuGVefrpyD50a61Yodj9ZRVv_Xe79beaNQOOAI9Br9X9RPO6ndoKh9QTz9SI7FYcVpFMX_tYxbd5_iqugarVTsfH6IlRySkT5Kr2IBuOup13mCbPIFcG7eVSthc8DCuEMl1DmbUK2oPiOvgNz-Rp8JqdZCZzd627nc=&c=NLzMpLAwpqdf8YmNkPetRBVScgvZJKHMCYZdWhXLR_e1muYQp6bATA==&ch=SM_KLJI7s4SZs2UYdLSDBqPj7HMTaQoTAJ0RgyxgaYmn-rjG7sqdvg==

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001qUslQB2SHr_FjfgFNcmWp4YpdpT8G_-A3tIblwIWPfuGVefrpyD50a61Yodj9ZRVv_Xe79beaNQOOAI9Br9X9RPO6ndoKh9QTz9SI7FYcVpFMX_tYxbd5_iqugarVTsfH6IlRySkT5Kr2IBuOup13mCbPIFcG7eVSthc8DCuEMl1DmbUK2oPiOvgNz-Rp8JqdZCZzd627nc=&c=NLzMpLAwpqdf8YmNkPetRBVScgvZJKHMCYZdWhXLR_e1muYQp6bATA==&ch=SM_KLJI7s4SZs2UYdLSDBqPj7HMTaQoTAJ0RgyxgaYmn-rjG7sqdvg==
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d7b49758,0x7ff8d7b49768,0x7ff8d7b49778
      2⤵
        PID:1676
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:2
        2⤵
          PID:2328
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:8
          2⤵
            PID:4032
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:8
            2⤵
              PID:3556
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:1
              2⤵
                PID:1824
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:1
                2⤵
                  PID:4340
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4932 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:1
                  2⤵
                    PID:4240
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:8
                    2⤵
                      PID:3580
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:8
                      2⤵
                        PID:3296
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4720 --field-trial-handle=1888,i,11641227651910812139,13028945090982647669,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1028
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:4916

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        432B

                        MD5

                        a712999956af833930e7c35d9c207998

                        SHA1

                        03db5b610df7123fb35407ce5b7903d491ee2d0f

                        SHA256

                        fd344c1b68036e68a80aa9c0798f93342d6c788892e07d148512f9257bdb5d38

                        SHA512

                        3d6bbc79d695f5b6273e894961185bf7c83d27aff1c55b9751110b6380ca6f897dc92a8de6a1cb41844b93ead39bcb1542ec6824d020806a613ca4ecd2394c31

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        165e05c1e512e5cc157e5fbeccd5ea08

                        SHA1

                        1a1b064e938f22231c22327849dbf48ed0736446

                        SHA256

                        dd99662e3cb38dd6297183b7e85ab38249454048432c774b66c8ce3f8c47195c

                        SHA512

                        9fba21149d6f37c1b8233935f5e116eb3e49236e2388c5670863f706014a14612960292de2abbd7c61c475afb6d48cac58a259e3af5eaec0ab9fe39bbe07f551

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        3a921704eaeaa798075f73c733a356eb

                        SHA1

                        550bc2b0354809489faffed7b4181c5d3f26cc2f

                        SHA256

                        f8a537bcf8bf44cc36e8c8d253cc8ef019ccb194b667b541b093235ef8ae4578

                        SHA512

                        8e147469a8c08c91384c204e763a36e2b7e8be1863c40fa040ed56786bd6c2ef680996c5ff18cb3085ecf61720642c2625ace33dbaad08ed1c9d31bc516bb930

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        d8313acc928f8ccad75273630d4fe8b3

                        SHA1

                        0e4709f2390911b0aea2194492e6f2e906637b87

                        SHA256

                        6c35ee11ac9d397f941032f90e8038f935ed7115bcc8bbed9f76682d951a7dff

                        SHA512

                        244f4406b25d0bb38535687c8511c46f40ecb8870507dfb169b1b3124257f3a592706993122b920870fd9f3f47df4a3b6193553f13067a719325bd8cd85a15c9

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        a23ab62c0672106b17f3b4d83c9b02d2

                        SHA1

                        94fc0437bc2d501b40d258f99f92018f2f167847

                        SHA256

                        7449f142b1803c0edfc8558f355f20b287177102b23f50e6d86903c01c4102d5

                        SHA512

                        6154c09bf9dc4062538a9f4c05513788735d46d064fe1f15503d2d4a5c30b99a114692f13a59ed10c547c47cd1c89ccacc31803761a3f3a7286012827c824559

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        9568d7e1d8793992accde77b1e5e5a88

                        SHA1

                        3bba0a98614f0698c5437c4d90b2a502781f967a

                        SHA256

                        59773c9bd49a4fa3c86074189a2ff3a7057bd343262b72772eff1eebc5b88db8

                        SHA512

                        84d8fb3f20b986dbad3733937d8ea3bc88e609c220846352b9438c447e9dddfe943e5aed9c7cbf33f3c81e5bd721068b39b2e6ad90d34fbdac00f2e15b5b7049

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\e8d9e53e-fdd9-4ba6-ad30-bf11f3aa1a7d.tmp

                        Filesize

                        3KB

                        MD5

                        f8bee8865d7cb82279a7e487df9a1573

                        SHA1

                        86efe5cfc5503c9cf00bc36859b5cc935b7e1965

                        SHA256

                        870e39ad90cb4db598d6bd670fbabbfccf6b072c127c6c9642a4817dc90332c7

                        SHA512

                        759bbaa9166f417b879bc037ef59f588043a1e587248e7e0c3ae7f9bcc8fd44281a9389807398d70c7afc2d7fb57c57a1c655de183fba763a09f35dc7e784d0f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        5c5b4690ec64260e110a84855edffea7

                        SHA1

                        ca85ec78a1df1cc8606f560f2db5e28db5d672e0

                        SHA256

                        36bd07b9e094327004e9a07fd96badfbca351a81f8a1edacbfd986d8cf5cc23b

                        SHA512

                        dfcfac062d928c317ea3b02fd21a1eaf5ef8f8c48851f5dd75f7c3ff7e83917e3fc7d3f8560a8a05da87f064342d26aa3b266cbe5ff594b9424b75f6e4768a0e

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        253KB

                        MD5

                        81ae124169ca3ff1a34a3757176a47b3

                        SHA1

                        3137dc379990de47566d32d378c55a0674481e8c

                        SHA256

                        3402b96fcf259f26bff043ff92581c335a69a457c14e2d997f6305bbd7b643ce

                        SHA512

                        0282afe3a8267250604c62bbd4cf9e5cf4553c90034870cc66699542666f97bf9b8a97cc97ee69119dd8578ddd7bb6b6ccdc5fc511dd1fed0c7928102a7dbd6f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd