Analysis

  • max time kernel
    1800s
  • max time network
    1687s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 11:12

General

  • Target

    http://fileproposalofficeses.top

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://fileproposalofficeses.top
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc82f19758,0x7ffc82f19768,0x7ffc82f19778
      2⤵
        PID:1896
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:2
        2⤵
          PID:644
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:8
          2⤵
            PID:4376
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:8
            2⤵
              PID:2896
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:1
              2⤵
                PID:3712
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:1
                2⤵
                  PID:3960
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4712 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:1
                  2⤵
                    PID:3060
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5060 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:1
                    2⤵
                      PID:4668
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:8
                      2⤵
                        PID:4936
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:8
                        2⤵
                          PID:3500
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4700 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:1
                          2⤵
                            PID:2400
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4084 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2368
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3624
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                            1⤵
                              PID:3652
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                              1⤵
                                PID:2644

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                120B

                                MD5

                                9a68d815df2f177215726cc00c54d8fb

                                SHA1

                                0715585bb2d2b10240b843b0653b031b07b1b518

                                SHA256

                                756d447675e042699ac65ef973e27724545e829f2d1fbf5e66a5bd14320fd216

                                SHA512

                                0ca9b82a1e2006d962227536dfc4599b96b704ab515e84beddeaad2ac55aa9174bd7fb11d5afe9adfcaeb1f967c55d1bd4c56d84bd2905061690a8982935ab43

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                216B

                                MD5

                                767acaa98537da361e104c773cb40db0

                                SHA1

                                50963eaea04df424af0e9bd7ea1f08f55152815f

                                SHA256

                                45563c7e7f5d1817ab326558143b977c8763e412c238a3fe55e4fb285ed512ef

                                SHA512

                                837a957a3e87ef33778fa8869cb158ab986f495bf83d3e539526443d359e8b5124d3ac01ef88b8801ec62438df3dfba1456a6255b77045d1a672309e5b681cdf

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                610ebe5234d32bfffdd67434d51507f6

                                SHA1

                                ee57dce9437fe7c5eb2c14f58627f448115ca413

                                SHA256

                                d6c2e08d6aeb328993f0aacf5e9b4fab0032d08beb220f05e8162f2711372b81

                                SHA512

                                da94f23a8100c1ccc4306608c3da52c6ec31985a1ae8aa642028bf0b297434938d92d5375179d120aba150b85b9955cd3400f9f8b0ba4f35e4ae386639fd8f25

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                0dee7ea9ef7ef4597951ce2c17532f23

                                SHA1

                                78644348cdce3b3b0ae3f4a6fda0d1e209131de1

                                SHA256

                                0ae32a86532710894a05c9b70728ebc853a3ebac979fcde5c85b2934f5665427

                                SHA512

                                a4e4a695df6f03e6f5dfc31ce4a7b66896f42c8a7541aa722069bd6d4bb549acbfda9183050ff264694c9b4757aaf31ee6d54b9221e769fce3e82a1e45619a05

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                537B

                                MD5

                                5db4ab9a78257370565a33d81175287d

                                SHA1

                                ea048d33fa37948bc095e95646ee67e40b7432a3

                                SHA256

                                d04147048da83ec3556151c95ff0488a4117409bdddcae6d5f74dc00a9b0abc9

                                SHA512

                                796dd0f2c7a50de48d9be1ded4ac466723639ef9c88c1f5f261b621d7187a605e6cd348ff9c07bdac1e3a528cd2126493680df5d705305f20643d04c12142aed

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                966dd5e39711443e0d7e38d18fe37a4d

                                SHA1

                                15dc2a5c38bcb6f5de28e6afe667b4f6bafcb4d2

                                SHA256

                                e286356b49fcf0f4d56dbf2fb78c68b4431f4cce9424e23dda2f01c6fc7cadc1

                                SHA512

                                5bf995c877639084dc117708ac746393c35777543769182937341babb0c2b22d2f8ab8593f43fb5a5e80cd36f242f16fe6845aec72466f495aac638d4d41acd5

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                3ebf264b666db475a147cd71dbe3e43e

                                SHA1

                                677136d29ef6034359d7b01b94f6ccbfb2975d02

                                SHA256

                                efc39fb3cae5e489f16d530d21dfc4f4a2794b38f09f3348c4ddcc47a86acdfd

                                SHA512

                                8d9a337e386e69d8cf755cb3ec67fabd4c75d0438c361102bc1405e1ccd5964d53bea30e76025551cedf64a6f7295de55c38bb0db55b8ade792d57d408de0f6c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                128KB

                                MD5

                                6d43a375bf968d4f27c94e14d731c777

                                SHA1

                                0ed87c114879b2277bfda647e7114328aadbb44e

                                SHA256

                                7f7a6df4cce532e64339c47e3b167e5274178598edd70f1a9857fda1d6b5e227

                                SHA512

                                f568ad80e14b9e11e8220e9b1ebe09ee84d0dd22c90f902f1026b863b99732f00daacb5745cb76528be365617043ec2f88ea1798c96aec0a26fbe1f842681048

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • memory/2644-132-0x000001C6EFE90000-0x000001C6EFEA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/2644-148-0x000001C6EFF90000-0x000001C6EFFA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/2644-164-0x000001C6F8300000-0x000001C6F8301000-memory.dmp

                                Filesize

                                4KB

                              • memory/2644-166-0x000001C6F8330000-0x000001C6F8331000-memory.dmp

                                Filesize

                                4KB

                              • memory/2644-167-0x000001C6F8330000-0x000001C6F8331000-memory.dmp

                                Filesize

                                4KB

                              • memory/2644-168-0x000001C6F8440000-0x000001C6F8441000-memory.dmp

                                Filesize

                                4KB