Analysis

  • max time kernel
    1799s
  • max time network
    1716s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/03/2024, 22:58

General

  • Target

    IRC.dll

  • Size

    79KB

  • MD5

    f21ae5e05942e1bf0a8d790a8ac1db79

  • SHA1

    fc3a681ed4262f8d6da491b001cd8eca0d49333b

  • SHA256

    4161b837e483d66f51628721b767c87da74b0919db350e26b8e29cc2ff6632e1

  • SHA512

    6c7f7d5f563688c41ce68b0ed6849833d6ca2342ce08c255686ca3770403194595d2cdf54effdef04e16d405e48c3e3fb49552f8cd03aaafb12363b4d3a8c2c6

  • SSDEEP

    1536:jfFpA9WiXDejive1YclFqGtKGECA6yyPSSgWWVJUH6pXd5Pot:7FpA9WiXDYive1lTbKD6yyP/WVJat

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\IRC.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\IRC.dll,#1
      2⤵
        PID:2660
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4976
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:524
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc8e679758,0x7ffc8e679768,0x7ffc8e679778
          2⤵
            PID:3356
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:2
            2⤵
              PID:4068
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:8
              2⤵
                PID:2076
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:8
                2⤵
                  PID:4412
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:1
                  2⤵
                    PID:3012
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:1
                    2⤵
                      PID:424
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4440 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:1
                      2⤵
                        PID:2516
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:8
                        2⤵
                          PID:4496
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4992 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:8
                          2⤵
                            PID:4184
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:8
                            2⤵
                              PID:920
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2500 --field-trial-handle=1864,i,13715739175704460323,10672386258376128782,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4364
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:872

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7adff862-2d38-4cf9-9cb6-1e1d2ca6b9c7.tmp

                              Filesize

                              1KB

                              MD5

                              6f60182b48c0585efaaec0932d8dbee5

                              SHA1

                              022434b4dd897f20c330b08efc8334538393b1b4

                              SHA256

                              128789489629bec649bf8880f30a836edea8677d6aeb404d31c9893f478691e8

                              SHA512

                              9c59cd171fa99c87854229ad1be0b618de8db89208bacfc731ef32dcc76471078878a2997e4d80fa1b287f84f965fc24c8b81763bded0657377e9c8d2482fcda

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              9c09ee979ce8ebebcaeaa4dc7a260e96

                              SHA1

                              a4ca7c2fdc7f636467d979dfc49df566b3f05ef0

                              SHA256

                              17736daf3982631fbff9aa01b98fde18150b4b85ce8b59e52767943f9a89ee28

                              SHA512

                              9b3ab5eb4231078ad51809b329896e26024a9ae2a87324d0ef7338f55729e4e2ac5f6a1acd7818e7a0610f2d985a3d897b911a2ba076a47ac453f3ba468d03a9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              1b41fabdd9e2b6c01141d9506c2968f6

                              SHA1

                              93b77e56d4b343b4df6a12ec51fa4c60eb9f892b

                              SHA256

                              35009c4f70f45180192436769bae8b93e975b475cbf75bfb2c3cf29a0e197720

                              SHA512

                              27099c7c78b599983a1300de5f1b7343baadc3c0c44c6d3485807538e109170aa3eb96040c5ae65ad7830eb49c7e28402119a8a0b095966e0358e0648be6377f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              e6ab8dfb71bdfa5826da5f5026115b4e

                              SHA1

                              d316a7495624701ac5cd9b77b6969d8e71d6d968

                              SHA256

                              001816b5b231dacdfeca0886aa0a71f384ae3a365c8dee6a0cdaf4979056b86e

                              SHA512

                              aeabe4e506bdcf5931e2b77530b52ef1ba1b2aa3b696fc831db1f839108c9d03a05feb0f621a0831d3c369cef80cf5ac89a0f8b3647215a1b9d39acb0d617b18

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              371B

                              MD5

                              9573cac8a7ef0c2af232621da531ea98

                              SHA1

                              45151771363d7133d9630a32c3f3ecac113663b7

                              SHA256

                              39877092fd67a008812478f71655ae0a0f4c60dc8984b35518a4dcfd9bd55874

                              SHA512

                              fd7732934c1f8b505a3ca8e9a34877fb4a8942d990f6174c8b417768d80b79e54220674c5764e41ff3d43e9ad4a46222331fc1b70db906b5d6fe09268cee730b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              8428c40767c3c99aa32a3a2e88fa6aff

                              SHA1

                              9de6710b1e8fdefa45feff817c6765cec3200f59

                              SHA256

                              b6ec3d008d4643815360c1efc1c75c4e231b6fad76c21c7711ccc7214aa51e3d

                              SHA512

                              7b3c94642059c8f64553372230194c89f8947d9c8ed8b57f22af6dec1b24c7fadd68dd784e6bb156c95f4404d2a99228d8bd639acec09466052325e8fda5d97a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              174395c29641a81f470f60242409bba0

                              SHA1

                              9cee92ac7f2b7328f9898e74dc7c6cdaa92ac5ef

                              SHA256

                              b4b49a3cebc2485734531b84536228c1666e8de0ae72808a25f1162ec1c75682

                              SHA512

                              32d655ae5ffd8f35177d6f47a4267a699ada63dcd9f44331959f7ece0c2f86f34db55d6af13c2a775f34f2a3f3f961a2f838ec33f282dcaba578d9cc6f7b641c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              63f03b8a8dd1c64f56bc92bc192be83e

                              SHA1

                              18d07142b70b0f3805cb542a8c16eb8a1f45655f

                              SHA256

                              b142d4b8469cc3b6571d1429540d4dd1fc6e1e9cc645870193008d6e639218be

                              SHA512

                              797e637f9f6ddecdab4e892fc911b085f673c9dc568385c8da821a03d7f598cf51f61b2a823a023f6ebef7e189f4006832e72125c901ab25035441e4983e3834

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              260KB

                              MD5

                              b73441c63a706c72a831c9c7d3c7803a

                              SHA1

                              a9e082e892944ffa31367d0bb22cc37e6ce463f5

                              SHA256

                              221788fe291fe7d4dc07dbf1be15ad116629bcbb434c1dccaec23a1b4de8cfea

                              SHA512

                              05d37f036358ac8806b8cb0ae4f8a02645500cf689fa1a850a765f16bfa982386ee625090600cf2d17f63d54e1372b3ac094d0718ac407b8bac057d0ff5d1bab

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd