Analysis

  • max time kernel
    82s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/03/2024, 18:10

General

  • Target

    http://usps.uspxstp.com

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://usps.uspxstp.com
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff986439758,0x7ff986439768,0x7ff986439778
      2⤵
        PID:800
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:2
        2⤵
          PID:1572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:8
          2⤵
            PID:4340
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:8
            2⤵
              PID:4936
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2624 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:1
              2⤵
                PID:4892
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2640 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:1
                2⤵
                  PID:4884
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4860 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:1
                  2⤵
                    PID:4828
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:8
                    2⤵
                      PID:4412
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:8
                      2⤵
                        PID:4812
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:4048

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              987B

                              MD5

                              dd10c38ecbaea04a8b5befa92122550f

                              SHA1

                              4c33b8a8d306ced2c8839159b464afd437cce569

                              SHA256

                              1a42a46d263d882e2aa8af93da37856a3eb8c055b90bedd3d983c5122303b205

                              SHA512

                              015216c7e176c532881b1317af8df14b9a666d578ddb20605686da813d6802155f33b7d8e2c52718bc195f7baad9e533ebb3f379ae7c091354d3f60de9de4f62

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              de3a5841009e41f2c823fb415261d3b8

                              SHA1

                              307c5876282a64d2174ffeeeff8ed79a9fcc5239

                              SHA256

                              1556441a4029c91b658836f6acb964037035f7549743c14684c67e41ce4c0f8c

                              SHA512

                              978ba127a4692d7cb65f43afa372316a9cd51895c987324e6ca761860b82b6c9a67d01870498dd997685453aa635e037df0951564a71838bb36abcd0426156a0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              6614f2d3d6f1c2e9fac5dc1acded8225

                              SHA1

                              63eae782d7c316d2d7837e70a115f603a55621c3

                              SHA256

                              0c0c351a8f0fa230cfc82911415a7ef15a43b5a8a76b3a234e028788c899b20f

                              SHA512

                              0a20f45874086280a74bb057c56732e04e9302336337b8082049a867bc561cb4e236b4dccdc917ffcd26befc79d321297925baee92991d371cf50a29c51b93b5

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              8eb2df554e55a5ba7f4373a37028c04e

                              SHA1

                              83a18e4013a2cab6c52f882e1c0f12bc263c34c6

                              SHA256

                              1b9bc2b1f1a5fdd77dafc2411e0fe02053d72880966ea0f5643cd9e9be744b51

                              SHA512

                              de2062842f1f0b5668b3e364fdcc3a664090fd025e59baf9c6683c320fc5c947280a013080aa364ae451eb00543f145b4717bace57f9758bf04eaa464900e6f3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              b3dfb79adf4ee295eec70d7f59ad10f7

                              SHA1

                              87a85f178ba9f25f0fc643ea05db461ef8844d29

                              SHA256

                              7c922e5b78f41ce0ea65f576c711d8042ac5bb24b60a4c05d2b84f07cf5a4d35

                              SHA512

                              b6c9d5e7701ed143eaa13a3e1c4cc02cae0172aa1234ca8f8c1c1e0a8ad132c68b7c9695b788326d548c29e394095f7fd90b4fe12ac0da31b8b336b77f5c39f8

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              130KB

                              MD5

                              05421650f08048dc9f57d0fe3365630d

                              SHA1

                              d0d3af5cc625284da168289118198da4bdd8c307

                              SHA256

                              6599d04ccaa90baaeeabff04bb9015f2a0398feb2c1926c036a3ec3a9e1a7d22

                              SHA512

                              37e20ead04df887a31a92c93513b489c8fdc504b80015c2f8ec47b7a55a17f00c47a6c59c79846b6b3aa2f3a569fe2ef88ff1b544d61e3e4753466318d9cc4ef

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd