Resubmissions

17-04-2024 12:21

240417-pjjbwaga8s 3

19-03-2024 10:24

240319-mfpy5sad21 3

19-03-2024 10:24

240319-mfb3aahe54 1

19-03-2024 10:21

240319-mdp65ahd96 4

19-03-2024 10:18

240319-mcen1ahd67 8

19-03-2024 10:07

240319-l5x6dahb83 3

19-03-2024 10:03

240319-l3vbpshh6z 8

Analysis

  • max time kernel
    1799s
  • max time network
    1693s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-03-2024 10:24

General

  • Target

    EEEE.webp

  • Size

    29KB

  • MD5

    9485ce793d80b28b1f1a5041df199f36

  • SHA1

    cc6ef9708c3d31f6285e6172745f3af032d8342c

  • SHA256

    0a411e6a7f0499422b355db020dbc65be2cd2ef1fa297b752587080e66cac8d5

  • SHA512

    e547b8ff6d1b5c54740426ad387530acedb1778b2d79f10ce793eb4adc8b85b02078622a188dfa0428e500918773095a60faef4285059ed43418872e555c478e

  • SSDEEP

    768:iHv2vZr2itn04pqNFiFe3QCtVJ1b/7z8Vi7lo:F2Kek4QC7J1b/H8Co

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\EEEE.webp
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\EEEE.webp
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffccf209758,0x7ffccf209768,0x7ffccf209778
        3⤵
          PID:700
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:2
          3⤵
            PID:2052
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:8
            3⤵
              PID:3764
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:8
              3⤵
                PID:392
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:1
                3⤵
                  PID:5052
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:1
                  3⤵
                    PID:2324
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:8
                    3⤵
                      PID:4796
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4884 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:8
                      3⤵
                        PID:3980
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:8
                        3⤵
                          PID:4660
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1808,i,1268757435521249144,8157692773653177550,131072 /prefetch:2
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2776
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:752

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        e36d3b172422d93e30cb4904538d0d44

                        SHA1

                        ed4cd5b7c2e50ddee42bd001b54a9e618598423a

                        SHA256

                        2ac9ce164a0ad0266789ccc86b7e6b2650d5e1d758150dc48e293d87d9dda4aa

                        SHA512

                        18348af4ea39d52fd330edbb7d72a63ea1473a0c39572e4e61c2438c0ac7c26ad3008189fd7d4f7a4b4ca53fa69b11073dad0b55ffd9522fbc7b94698ec967c5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        f3232abdef753077fe5eebaaddc18ebe

                        SHA1

                        fe13767a1098865670f9888c2242f1bde3a6d98b

                        SHA256

                        268dfae6f42376731b4a58453eedb8e0d7826d90a018b482b5319f761b7bb184

                        SHA512

                        b8bd9912bfea8e948a421e285d175b5f732e925c6859b7b5d7d89dc136b855ba236c9ec335ad191eac8b55840c10ef315c58cf5b4d3d391d21ff0fe57663054a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        b3ca1aed052eaa197e5c012fade4d9ac

                        SHA1

                        1855246156bb288227e4a72c904663613bd5a99e

                        SHA256

                        50ab7ecfdce9e08f20972012a8f1eae1354379a47f6b26599e2aa9d5bbb996e5

                        SHA512

                        b13e37a130ac3db91cf857161e3d45d5ef9cc59e36daea921b3adef66f36aab6a861f7bc661c8c78af4d1153336829e169475e87e93b28c5ded92a98416bc52f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        529fa7cfe10324c3d5b2b87f2b175970

                        SHA1

                        357bf4e683d9a41fd7cad65d07990baefe7d15b0

                        SHA256

                        38e77550f8ee04764ba4fa9ad63d4f1f3c59f7f48ee8af80e34dfde86b665d8c

                        SHA512

                        5c71b65c31f544798e2b2e387ac4a51e7c6a1c968b6fe57675bb558db49d98c5c9ec1361b0f2d46cca3dbbfdef2efbd36ad22455d7e750992c081c8d9d1446d7

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        260KB

                        MD5

                        24fd2917a3651bd046c621da6d34971b

                        SHA1

                        88ace5d522c0da5b78681552350cdf7d226c6c7d

                        SHA256

                        d44686b2777f72faecfce2e30f7453744631c6065f855da9ad08e58524e481b8

                        SHA512

                        42b8ab0016d6388e9bc2224428c50a25bcd3986a7182f7f1af8479fbe365395906d0254d7fd9477a043e30329a71e9a03bed29ac2263230ec3ea472c7d37850c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd