Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-04-2024 05:06

General

  • Target

    c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe

  • Size

    1.1MB

  • MD5

    43ee675e00508da70a6ff56f176fbe16

  • SHA1

    3ef1cf018e43b69f46dd4931133bfcfeb878ec9f

  • SHA256

    c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296

  • SHA512

    230c3c0139138dc6a529d0c73c562f5a701ef6a421688f647ce30b609cd92eb903bd4a7e2b2650e7a0b2de7bba537b534962f2276dea3fc91ccca641fae542e6

  • SSDEEP

    24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8auu2+b+HdiJUX:ITvC/MTQYxsWR7auu2+b+HoJU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe
    "C:\Users\Admin\AppData\Local\Temp\c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd8ebfab58,0x7ffd8ebfab68,0x7ffd8ebfab78
        3⤵
          PID:3540
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:2
          3⤵
            PID:1220
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:8
            3⤵
              PID:5112
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:8
              3⤵
                PID:4240
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:1
                3⤵
                  PID:2364
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:1
                  3⤵
                    PID:3912
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3628 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:1
                    3⤵
                      PID:4884
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3240 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:8
                      3⤵
                        PID:3516
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:8
                        3⤵
                          PID:1272
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:8
                          3⤵
                            PID:1384
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2404 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3064
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:2076

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          216B

                          MD5

                          40c428ab9a5b79785c4b41daa72912b3

                          SHA1

                          63ec555cc326902b35994c9aa83463783bcd1923

                          SHA256

                          599213750aad59fbd9ca005074f485865afa5ff688b4a50bd3c05c46f80de87b

                          SHA512

                          473ab822627d5fabe5b0121633e55d66bb8aad6b1464fd035613b693b1957548d836a648959849ce7f76a17376d36088934fb8ba8e4bc2e2639a8037e19258b5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          54e11952c66d1cb53d594701e4d1e142

                          SHA1

                          21253b951cbeec2df7c75c3d79d87ba01d6927c2

                          SHA256

                          052518dc192aee4de09de22bdc133728d2ec7f02954f016110d6444685580f79

                          SHA512

                          ac4a285c9fc8a6c1ac8a786f60d25dca95893b902ec210335b41420413427b7ff4e43a2de04d86eaac81c57742c0b3d8a913ab482a06410bc8b9c325ea9ddfe8

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          2812861cbd905e736607f7d21978cd84

                          SHA1

                          1d014fbf7fe868788131cbd3445611d7e4a46c60

                          SHA256

                          d8b15af01305e2db3fc6a6df6457d111177869da2c9f41472a68f47cf763bfc5

                          SHA512

                          344e1d040a728394cc3282d562ea6350e0d2d4197c6a58343506d869fe8ebae294b6da0e1e03a036473191cd55c8deb1c4b6337d731509fda83671b043e0e591

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          692B

                          MD5

                          f08eb16f5085eb4e37e9f8c21c0d4114

                          SHA1

                          c2b63eb04d5e82ce4aa9fd5f5af1f58f3de3835a

                          SHA256

                          c14062d14508f118520c77f7c9d02b7b5cb7416cc85f485899568293acb33a24

                          SHA512

                          7f0a384a495c4d923b48880ec3f6fa7daa6dd212d33688a01f9745d78c8e1a0b743ee435e2984971efcae2af1969fade13f805233f83f9dfb8823cc037b3ba85

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          38049fc40164f0b6e0417762aa5d6da0

                          SHA1

                          265a1ab1ae2539020b7ea0b3daf9f9b655b25b2d

                          SHA256

                          d6ea7ba9743ed3900bc15c26898f0a7f55818d81e9c91feff7df116643656111

                          SHA512

                          4c0ea8323b1aacd5f4f9d68d8fbc21f297761ca28232107b5a525a79b440d1481961e82b139d442694f3a98936cd33ece57b5239c13672f56f48235d2658adfd

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          16KB

                          MD5

                          81a52e5a6a51e17e195e95e9e28bc572

                          SHA1

                          cfac2d2008c3d4f9ec6febd378b3200673077ec0

                          SHA256

                          d80318963770f6dde8091beb1b9f44148c9c5530c4b69d7b1acbc580426e3c80

                          SHA512

                          f315ed2bd4feb1ed4e6a862da64953414df8129fc36a3a33cc0a1f313308d48df6a56770d6e46aa4153ac93edd92ed74ff0bb612b13de5f4032a821135fcd00e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          251KB

                          MD5

                          3f14b49db17c51ffa340e1f996b719f8

                          SHA1

                          9c6f296dc2b7173df55f6df4fd0ca25591355027

                          SHA256

                          a57401696b7df3790e69859ffaf14d50216e6702a1e9941188a9a74dcc1d41f6

                          SHA512

                          eceb4a0bcd2a7866d6ebf9b4bd98551b89bb17c9e0c9868962be7c788d0293f8cd96f48262210d52229c5fa637dd19c2d0e5fb25f54c7af44f5d6591e85833d1