Resubmissions

16-05-2024 16:39

240516-t6faysdh72 3

14-05-2024 14:36

240514-ryw8dsbd49 3

14-05-2024 14:35

240514-rx7yhaba9y 3

07-05-2024 14:36

240507-rysvzabd3w 5

03-05-2024 10:51

240503-mx5qxseg99 5

29-04-2024 18:03

240429-wm3cgsgg97 3

29-04-2024 16:46

240429-t99c7sfg7z 3

24-04-2024 18:17

240424-ww3plseg63 3

23-04-2024 17:19

240423-vvz2naac23 3

Analysis

  • max time kernel
    1800s
  • max time network
    1695s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 01:18

General

  • Target

    Elmo.jpg

  • Size

    5KB

  • MD5

    a6564d72511a7a126fca09696f55dda7

  • SHA1

    afe5009a79b718a57f7b47295bc2dbaf15f15b6d

  • SHA256

    20656fb66b0629c323be0f5a94ccbcdc7ba7fe8d14c6a11f90de18819cfc48b0

  • SHA512

    bb484a1c1283676583fa04539b77cf5735e45b60ba13e8911a7da417159475cf2b70f2cad7ef2ea7b65067b715ac1bc9c57f2169659da3831e4c32f58f504b0a

  • SSDEEP

    96:nBxQRQwdVJHiRfc3E1yU38aUuurzdm2l492S8VlrRV1TfHUniBTF4Tb42UvMmcUd:BWDCRoE1zUhL492FTVhsn0u2kM

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Elmo.jpg
    1⤵
      PID:760
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86fde9758,0x7ff86fde9768,0x7ff86fde9778
        2⤵
          PID:3112
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:2
          2⤵
            PID:2584
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:8
            2⤵
              PID:828
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:8
              2⤵
                PID:4980
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:1
                2⤵
                  PID:2320
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:1
                  2⤵
                    PID:940
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4712 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:1
                    2⤵
                      PID:4008
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:8
                      2⤵
                        PID:1872
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5224 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:8
                        2⤵
                          PID:540
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:8
                          2⤵
                            PID:3624
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5232 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5516
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3648
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                            1⤵
                              PID:2648
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                              1⤵
                                PID:2820

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\28084a6d-1699-4d18-b2a6-1ca141418194.tmp

                                Filesize

                                1KB

                                MD5

                                fa1756d6a44a6480745d6b26c7158f11

                                SHA1

                                1937a12eb0785e29c65e11934c583e95623b2c59

                                SHA256

                                c3ced60fe809ce812b6001634bd4c782d4fd1f79a42232cb11f29d50809d2c09

                                SHA512

                                32928df46d6324439d133bf61ba4a15980142a1b3dc369a36954267147cbb82681901418cf4eedda321bc23b8037f6559f09ac770aefd7302c2716cc4998c221

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                82f6afac5a15857c18c77455ff17f009

                                SHA1

                                983a5e1847b06b5a51ddbc605b4c5cfb5736a01d

                                SHA256

                                3bc373d216d35522a98bc070d406b012f9c7ae311b5913c4fbc83a33f5cc11e6

                                SHA512

                                9268fef9857e3e79cda445074fc0c14a1acfb84b6dee07aed1b251c959e9f2b2ee3ec38f2476493ad549419ba48764b1a0301afecf9db41dad9b4716ecee92c2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                e1b94950952eb7706f3c65ca2eb7bbc8

                                SHA1

                                3805070b3ced8649e3db587d4ffec554037ad3a7

                                SHA256

                                7c2f16fa41499234952e77521a2c6f9e689227c95da158f63a9b5589559c65dc

                                SHA512

                                a2805730408836bfb52f91edc907c552ec27a93ad8aa1140ec690a5c320bed8204356f84b3e8fa987b4873a9cb867a1275a0d45402b72ac7ada4dbc710117304

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                7d40874471342d0a0501ed6869c623bb

                                SHA1

                                9e8adb18d18ec2f28e944ec7b9bdc1065461a215

                                SHA256

                                25f5e6215147dca6936f9b6c236ad6697971299cdefe4a8bcdfa697e09018bd6

                                SHA512

                                80edfb5e3a245016240e70c4eed51dc55463c0e2f84051bc1718b87468ea17c916009b90ba1d97962100e93be589386a6d797be0a467c82a8adb1db939c72256

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                e444ca987b57a52dea97f89279685a2a

                                SHA1

                                3bb85b13e92940f724c13de7972a77d9c6c2a35e

                                SHA256

                                03ae7c13ae229aabf7c6de601e343e19e2faae0194b53b7588b63669d8631006

                                SHA512

                                b56fe0e6f01888a81c56aff056518329d90a8ac244eb30563c6a940b2fbd3c18d6560ff76a692494643372864c6af81db41bbb795f59bd8e91a819a2b1120353

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                86d671288a00065f6b9c04962b48caab

                                SHA1

                                30b4a15fabfeec115a3cd30c085dcf2c5524d3d4

                                SHA256

                                de246aaa514c1e15ae7fb9b7ba499515a312899817f3fbea72e5c72a8cb20866

                                SHA512

                                d11a4bdf5c52ddc21c19941e5e107ed9935929e3a67f71b40cbdd944b60446badb2d5807e242fa6d7154130230837791a5ef665f7ec6d80df1a0ec255af2fa7d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                90042b57c1c2f189e5658da4964475be

                                SHA1

                                8032b9d775ebef3e18f88eb1a09db2830ec43c26

                                SHA256

                                8b92da013801f395b2b94a3f343c0ed1c9e9f67baaa799ec9a4074a8beaac3db

                                SHA512

                                99c985051b9516aca61e29f7bb1c54b2afb3a36b248ee3d35facc3a9a2e777af8e2da7f58f9b03b6afc63a4f12ec4e63ac672c13b15ff7a7f6caf7587488cc2f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                258KB

                                MD5

                                7a2bc8cecba7c2dd4e4582637c665d14

                                SHA1

                                15cf8546b1af70f7b6d1c1501f684d5ed1eb7d31

                                SHA256

                                0b37223d1735faf23544b0e8e02a1c8b283da01bbb35e0b6c1915ffbebf6742e

                                SHA512

                                28a0bda88672776a5be717368e78f8e042773eb5d48302efc5cf7fcac7b426169d4dc1d816e86db633c6f6ca4e8e7711d74eddc972d7fcf1a9ca2d420078b234

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • memory/2820-90-0x000001C837D40000-0x000001C837D50000-memory.dmp

                                Filesize

                                64KB

                              • memory/2820-106-0x000001C837E40000-0x000001C837E50000-memory.dmp

                                Filesize

                                64KB

                              • memory/2820-122-0x000001C840190000-0x000001C840191000-memory.dmp

                                Filesize

                                4KB

                              • memory/2820-124-0x000001C8401C0000-0x000001C8401C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/2820-125-0x000001C8401C0000-0x000001C8401C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/2820-126-0x000001C8402D0000-0x000001C8402D1000-memory.dmp

                                Filesize

                                4KB