Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 09:54

General

  • Target

    https://cdn.discordapp.com/attachments/1213306680360574976/1216087706157973624/nep_cheeto.rar?ex=65ff1cee&is=65eca7ee&hm=d41caafdff0a040bd7466f9fe527e2d4f34413855b09f46f92dc62b1d62bd14c&

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1213306680360574976/1216087706157973624/nep_cheeto.rar?ex=65ff1cee&is=65eca7ee&hm=d41caafdff0a040bd7466f9fe527e2d4f34413855b09f46f92dc62b1d62bd14c&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffa84c19758,0x7ffa84c19768,0x7ffa84c19778
      2⤵
        PID:1144
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:2
        2⤵
          PID:4844
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:8
          2⤵
            PID:5108
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1900 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:8
            2⤵
              PID:1560
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:1
              2⤵
                PID:1980
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:1
                2⤵
                  PID:4468
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:8
                  2⤵
                    PID:4664
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:8
                    2⤵
                      PID:2284
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:8
                      2⤵
                        PID:1512
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 --field-trial-handle=1936,i,13564320205697589863,2164914801710548963,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2776
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:2676
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                        1⤵
                          PID:2628
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                          1⤵
                            PID:4804

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            0ac11a9d6c4640d6d74db483c6e4b305

                            SHA1

                            26e3e6913f0fd4c0c4d10b7c0462a6d9e904a1cd

                            SHA256

                            9bf28aaa01c679d454f96f20b864eb4647598eb298912aace8b90ae3d27b87f8

                            SHA512

                            e0707735ba401234d8a9c0a0f832df9627e98edfe1a01a712575ac4d97ddec0cff0da0ace0e3d0c282bed40b19a0e2b1293dec101d4e218f0571fb8f57989eb3

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            f23b1efc9a26a23415e084279fe1737d

                            SHA1

                            3585b86bb84d1139ee70b8001d5f0123117cdf5f

                            SHA256

                            a72ee6122c0f40d06950063ea8a8a3e50030070e7cea1094b0eaeebfd743f568

                            SHA512

                            91c36f30c9864edb5372b3140757613d628491a5e1b2c60095768b497916d2edcb9079f62cabf23ee2f9bd8ba0b055f438d53d7cc4b8eb9254db2adf3fe2c952

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            bd1199386b88ef7a62947413eea69f85

                            SHA1

                            4dcae9f30ecb4defb71dbe71e665a81f511dd831

                            SHA256

                            c1dfa933ae102ebccbb98d36450508c84d85773a7decf5f4432febd87942bbb1

                            SHA512

                            3953dc707624df589f1ffe994885443f0281216be7b79de1b720d162897c03f1d311eeaeb7825f3aa8c9265ca3846113cd17fa5e5b576c742f7f2fc23d80eb1a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            128KB

                            MD5

                            2c74f4559e01b5f937957b2b56670028

                            SHA1

                            cad42baee083dc84f22d079ea06c7408bee05a8e

                            SHA256

                            c8352421793a1e7d2cc4a0fb3c9a95807f34df56c9dc29eadc06bc3373fe172d

                            SHA512

                            9a97c17e6f90e22db5b42a8d004c0c89689177f42823d9c4ec77ff61ea6813286ab1becabd87cbd655041121f5173b4c99275a373fb504fe1485a0527dfa44f6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                          • memory/4804-121-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-124-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-115-0x00000196B8750000-0x00000196B8751000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-116-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-117-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-118-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-119-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-120-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-83-0x00000196B0060000-0x00000196B0070000-memory.dmp

                            Filesize

                            64KB

                          • memory/4804-122-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-123-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-99-0x00000196B0160000-0x00000196B0170000-memory.dmp

                            Filesize

                            64KB

                          • memory/4804-125-0x00000196B8770000-0x00000196B8771000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-126-0x00000196B83A0000-0x00000196B83A1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-127-0x00000196B8390000-0x00000196B8391000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-129-0x00000196B83A0000-0x00000196B83A1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-132-0x00000196B8390000-0x00000196B8391000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-135-0x00000196B82D0000-0x00000196B82D1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-147-0x00000196B84D0000-0x00000196B84D1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-149-0x00000196B84E0000-0x00000196B84E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-150-0x00000196B84E0000-0x00000196B84E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4804-151-0x00000196B85F0000-0x00000196B85F1000-memory.dmp

                            Filesize

                            4KB