Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-05-2024 00:40

General

  • Target

    7z2301-x64.exe

  • Size

    1.5MB

  • MD5

    e5788b13546156281bf0a4b38bdd0901

  • SHA1

    7df28d340d7084647921cc25a8c2068bb192bdbb

  • SHA256

    26cb6e9f56333682122fafe79dbcdfd51e9f47cc7217dccd29ac6fc33b5598cd

  • SHA512

    1f4da167ff2f1d34eeaf76c3003ba5fcabfc7a7da40e73e317aa99c6e1321cdf97e00f4feb9e79e1a72240e0376af0c3becb3d309e5bb0385e5192da17ea77ff

  • SSDEEP

    49152:RoOF3Wh8esAMmyyImtH97VTjrtlEfmSX4b:RoYWh8JAV/VH97F3tlQ+b

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7z2301-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\7z2301-x64.exe"
    1⤵
    • Registers COM server for autorun
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4512
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2400
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\Downloads\ResumeEnter.shtml
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4960
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9bb2a9758,0x7ff9bb2a9768,0x7ff9bb2a9778
        2⤵
          PID:1456
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1884,i,4972255340718895134,7412789480593918327,131072 /prefetch:2
          2⤵
            PID:1340
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1884,i,4972255340718895134,7412789480593918327,131072 /prefetch:8
            2⤵
              PID:3940
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,4972255340718895134,7412789480593918327,131072 /prefetch:8
              2⤵
                PID:2596
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1884,i,4972255340718895134,7412789480593918327,131072 /prefetch:1
                2⤵
                  PID:428
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1884,i,4972255340718895134,7412789480593918327,131072 /prefetch:1
                  2⤵
                    PID:4656
                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                  1⤵
                    PID:4308

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                    Filesize

                    678B

                    MD5

                    674fbca0c38afca3a7197ae391292c29

                    SHA1

                    c85e5984488d3b3e2f44bc86dece374201691135

                    SHA256

                    b3642939399ead40fd830ca493c7a06406d1ac54a5fc998f9b2b2c66183d8d18

                    SHA512

                    5c5db78f7805b267996a0069b7a291571f85e33f614595484bbb6658f016df128bd44a442e68ae74c2b3dc5ab392a740b3be1c9aa70bfd5489f13e7026cf6fbe

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                    Filesize

                    6KB

                    MD5

                    d54b1eb76ea20e8c0759dc6b024ca05d

                    SHA1

                    db42a777fbbfb2b5b4e40bc17dfe5f6a90c617d2

                    SHA256

                    3bb17c4336b751f43550e2bc190197a09bea3bf35fed88e6cfabb9c4368b1bd6

                    SHA512

                    37e94bb73a1049b30bbd53c014a4ab16307fbc7ecdf27c2282ebf620bd4604d5e03085f2f139298b03686d0a92ceeab3a20f6e9355079c4de15eb58d2cfa5da4

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                    Filesize

                    137KB

                    MD5

                    b09d37f360df95ca6245668ae9213abd

                    SHA1

                    fcaf32553c6785777f3f96eb9ce922beb6b4cf1a

                    SHA256

                    e4263ef4497458d764438f49b6a3d8c7f076be88a125733bca119a00d090d4d9

                    SHA512

                    1cccac90f9e67150e2215c5668fa9e6b3992f05c5cab597e0a41d0e13e768dff9a0dc9d32ec3782feb50965843e727442174e16ff45056cb40b519444b95ef7f

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                    Filesize

                    275KB

                    MD5

                    dd61ef574948739c447bb2a3bab3e9dd

                    SHA1

                    75f59f008e994e72ff096bfc60455511a7652c90

                    SHA256

                    59e70da8352a160a40c4693c018c2df8ffdb570e208f9304f09afa1b69347315

                    SHA512

                    a5337a092979c67c3508e6184668cc3d468f04d09bf3219d1944ae429cf06a2df46b45ce444cf2619efcd1d658b214a6728b4e6e6be48c4fc44ffb052e22cd04

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                    Filesize

                    264KB

                    MD5

                    f50f89a0a91564d0b8a211f8921aa7de

                    SHA1

                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                    SHA256

                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                    SHA512

                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                  • \Program Files\7-Zip\7-zip.dll

                    Filesize

                    99KB

                    MD5

                    956d826f03d88c0b5482002bb7a83412

                    SHA1

                    560658185c225d1bd274b6a18372fd7de5f336af

                    SHA256

                    f9b4944d3a5536a6f8b4d5db17d903988a3518b22fbee6e3f6019aaf44189b3d

                    SHA512

                    6503064802101bca6e25b259a2bfe38e2d8b786bf2cf588ab1fb026b755f04a20857ee27e290cf50b2667425c528313b1c02e09b7b50edbcd75a3335439c3647