Analysis

  • max time kernel
    600s
  • max time network
    603s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-03-2024 15:49

General

  • Target

    https://e5-nttdata-eloit-kl-in.azurewebsites.net/Account/Login?ReturnUrl=https%3A%2F%2Fe5-nttdata-eloit-kl-in.azurewebsites.net%2F

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://e5-nttdata-eloit-kl-in.azurewebsites.net/Account/Login?ReturnUrl=https%3A%2F%2Fe5-nttdata-eloit-kl-in.azurewebsites.net%2F
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaa4819758,0x7ffaa4819768,0x7ffaa4819778
      2⤵
        PID:3892
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:2
        2⤵
          PID:220
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:8
          2⤵
            PID:208
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:8
            2⤵
              PID:988
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:1
              2⤵
                PID:4644
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:1
                2⤵
                  PID:4248
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:8
                  2⤵
                    PID:4724
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:8
                    2⤵
                      PID:1576
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3232 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2064
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:1800

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      9a15c9494c418dd8315262a567412fff

                      SHA1

                      ea2518b6401e26a872255fdc8e9d3dd87a2e0d37

                      SHA256

                      8ed68aab97c8dd78dccbd86403a4410f6b53801ddfbeed40d19329d863b6e6d5

                      SHA512

                      ee3d54e4242ea0754bd879db265ef08a1b849d4b240d9da3f2477451ac6448b435d3e5da521f1d0043ffa3fb1167553331135d622ca22bf9a4c9a4a26808a12f

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      31be09a22e413e2f93c4fa1021fe2be8

                      SHA1

                      b49f5b8bfb9a5d38e27d7e8b141ba470a44d8e0a

                      SHA256

                      a70e7cc502b16a9e246a7e9e42ec4c7a4caab15e0f07a6d9da92862d92059893

                      SHA512

                      ac4c6052e351ce084635850b6823922bcca78b871066782c24d7b13a3fd520de1a9481cea52dc6ce47dfb9ef902db3b0d42a4cafc19c583698a4623dc9568211

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      dfbc3a67676ced58be1a7bfccfc5a258

                      SHA1

                      4ef048dcd90b19458742c498363026ec7785cf58

                      SHA256

                      217e3bb240a950944c495e3da0e95a3c29846a883cb716a9eb5fd8ed2de1cf23

                      SHA512

                      c7763e87bedf45cc6fda6989ee42234b8b8fd8b677ee4121512b97d99a1702cb15b0f72d158d59a032bde207b37ef07ec47a7079e0fa068d392d467dc5ec8ca7

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      9a9026d8a7637498987ed049a4935c80

                      SHA1

                      467e390b37b34fe389d0edcce7e9073b823b223f

                      SHA256

                      ef9ac148cdf3cacd3be2b64f0c63ec1713672f622917249f5f7b149316381713

                      SHA512

                      90e30955fb578712126a6124353440a8e723fe7ade0d09d54714d306e270ba843ea8a66712bfbe2dfdf770f6752d133171390ab068af6b7145dae22eda5f4d56

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      f24f990d2ad66edf8f7f49aede20b6ac

                      SHA1

                      307545cb39424c42bfdfda0c17dc7a0bdf7d1a41

                      SHA256

                      bdbb3e22f74790fdba0cd3581d318dc2151bde3fa833b879956007ece350948e

                      SHA512

                      65a88b882483a776eb9bce57b1985e812c2b5fdb378fccb48cee84a80528dda711ea8306bed4ae1dd036e5593de29d2627e435a5363a7a95959a71229f05bd84

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      130KB

                      MD5

                      55081481b7ff5421b55b8ee86a5e453d

                      SHA1

                      8493573353a47dff97c2ba6a4056d153a30ef6b2

                      SHA256

                      8783673cd320290938eade9e2ea969a7f4110aed8f43121e2386ee27e5992aa1

                      SHA512

                      9a88e5d6b5999598053a4c04870f34684e868dc9d671964c85b4a9cf0979390bfe01a71165e0d6fbfb41ea275832ae99d1f5ceecc9c14c16bb9486bca00c577d

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                      Filesize

                      2B

                      MD5

                      99914b932bd37a50b983c5e7c90ae93b

                      SHA1

                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                      SHA256

                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                      SHA512

                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd