Analysis

  • max time kernel
    34s
  • max time network
    14s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/05/2024, 10:15

General

  • Target

    dddd3.exe

  • Size

    89KB

  • MD5

    c54b481bb47135aa63a8cb41f9d9d224

  • SHA1

    4cbaad503d0480a3803fe9034bc47f0682293a46

  • SHA256

    d16c7999b80c89d6c9db473e0c0c6be084c25b43aef5b66782680b85180d4f61

  • SHA512

    947f749d4188488ae1c505cb9cabc5ea67a6b668e80c2a169ca8be8bb8843f3e5c4a10a72d4ba48cb8a1b357bfbbc14bfc3518063b05aef2089f81cb8481e59f

  • SSDEEP

    1536:T7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfSwMOA:P7DhdC6kzWypvaQ0FxyNTBfSF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dddd3.exe
    "C:\Users\Admin\AppData\Local\Temp\dddd3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\565D.tmp\565E.tmp\565F.bat C:\Users\Admin\AppData\Local\Temp\dddd3.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" https://images-ext-1.discordapp.net/external/KTiCUUMhBcjMkKJ9Cf2FZLwqDRv1Mba_RoCBeANvBK8/https/i.imgur.com/0B3wfn0.mp4
        3⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3696
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd0771ab58,0x7ffd0771ab68,0x7ffd0771ab78
          4⤵
            PID:3140
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:2
            4⤵
              PID:2608
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:8
              4⤵
                PID:1240
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:8
                4⤵
                  PID:1220
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:1
                  4⤵
                    PID:944
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:1
                    4⤵
                      PID:3756
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:8
                      4⤵
                      • NTFS ADS
                      PID:3348
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:8
                      4⤵
                        PID:3812
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:8
                        4⤵
                          PID:3952
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:8
                          4⤵
                            PID:4304
                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\0B3wfn0.mp4"
                            4⤵
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:1428
                        • C:\Windows\system32\timeout.exe
                          TIMEOUT /T /5
                          3⤵
                          • Delays execution with timeout.exe
                          PID:3184
                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                      1⤵
                        PID:892
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x0000000000000470
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4280

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              e9de9ea8c7c4528212f224f5ee851aa9

                              SHA1

                              370a34291b6cb95848c43ae6b43f9457fe57bd5e

                              SHA256

                              322eecb979cd8bdfbd43dd004f3430adae013392e37182a19fb0e19b1819e31a

                              SHA512

                              451b910500c471d4a034eb497f673347be09c813a1f3f0eb6e3a6f621b6284959b3fd07e2bb05916bd9592935da38951c8d465e6d8509c3e223be1da3e5a65af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              522B

                              MD5

                              fb519bfbea1b601b831ddfbc766149e1

                              SHA1

                              97433418b8961e0d6e2dd22a257c663dc7ce0152

                              SHA256

                              2d22f0cd7fdc3e9f35c8344f460f27525fee7cca5718744f05a48e8452fea2c7

                              SHA512

                              29a6bb0581f4473c3894063f0e17b2331ad0698dab2e47d8f9d96da6259bf458ce9e86dfdde7a7f77e21c4d4ca631b364fb909fb9635ccf0bd1684e2aa5aa0a0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              9d006997965de4e3877cf6af49990e51

                              SHA1

                              0b9dba60aadc6d412dbbf4bd3b85971adebdc965

                              SHA256

                              008fdeff36b863803f7614a227a1d7ae8345f88c6d996b1f85893e433639ade1

                              SHA512

                              3cdc5fa1ad19f05cc1ebc68b037363565312e03075be4c10fa5720a4fb63cc241e9c62aa9b5e45d7ca672ba518e4f160b609ba13e1868a95b96cab3da20197a4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              256KB

                              MD5

                              0ded9a696e99285f53b558a5730f7843

                              SHA1

                              18f162302722590fbfee2ba1c8ffe39099e0822c

                              SHA256

                              3052f813de3749c8b624c130e517c4952e702324434cab2c34b0ff566b5b1ddf

                              SHA512

                              113a5f7597bc1fc8b71af618f9b8a885ae194e0e3a5d0720447d19be205f89ec6637f24bb68705f0b14a9636558618c25498cb08fa222a23de070795c459e181

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Temp\565D.tmp\565E.tmp\565F.bat

                              Filesize

                              176B

                              MD5

                              2d34d362da00c7b06dd543582bbaf08b

                              SHA1

                              804eaf3f1aee1c0872a0428e7aa1ffcf6d3552d5

                              SHA256

                              fdc14539fc049ab2aa660dd82f046d32c8c6bee046f50c77a24ee082d0333a24

                              SHA512

                              3553ab673beb20fdda9caef286a2c187084c7390fdc77d0f9dc3edd513507fafe9740a408548f91382677ef5081d729a91face6856608f96dd627ac3f3c7fb83

                            • C:\Users\Admin\Downloads\0B3wfn0.mp4

                              Filesize

                              1.4MB

                              MD5

                              333da7a632ec4b40f0b2e9187d4ec758

                              SHA1

                              a1d091f2e2eadccfa1e35a913636b8527b1560f3

                              SHA256

                              b52845af920a74a39ed4e0460f3654f737da93f5638189921c9f01984bb9ef09

                              SHA512

                              c4540dbdbccad3745984d0160e08e0be78052338f0af45c0ed4fd05036c7b8902aad8a65e5482ef9c4de10556ea2e8c327188a974e4fe74024e27677b4f7c6b4

                            • C:\Users\Admin\Downloads\0B3wfn0.mp4:Zone.Identifier

                              Filesize

                              154B

                              MD5

                              1f53b03319d51cfd614bac7a55c77d27

                              SHA1

                              1afea61e30c4b9b0c2797f7861d40bfccfe03041

                              SHA256

                              23c4085acc7328833c96f5ba590b88ea297d95a2efe166f5a89761ab544e4df7

                              SHA512

                              ba72dbc9da71ccca47ab9dae8a59932efd2a979ec13b1c0d7f22c5a4b8c2d59a6003c67b340c46b3432ac6b6580ca5284073bafccdb415ace9fd619e20b23272

                            • memory/1428-144-0x00007FFD092A0000-0x00007FFD092B1000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-140-0x00007FFD0D4A0000-0x00007FFD0D4B8000-memory.dmp

                              Filesize

                              96KB

                            • memory/1428-145-0x00007FFD07440000-0x00007FFD0745D000-memory.dmp

                              Filesize

                              116KB

                            • memory/1428-150-0x00007FFD06BE0000-0x00007FFD06BF8000-memory.dmp

                              Filesize

                              96KB

                            • memory/1428-149-0x00007FFD069C0000-0x00007FFD069E1000-memory.dmp

                              Filesize

                              132KB

                            • memory/1428-147-0x00007FFCF61C0000-0x00007FFCF63CB000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/1428-146-0x00007FFD073E0000-0x00007FFD073F1000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-139-0x00007FFCF63D0000-0x00007FFCF6686000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1428-137-0x00007FF62B1D0000-0x00007FF62B2C8000-memory.dmp

                              Filesize

                              992KB

                            • memory/1428-148-0x00007FFCFFEF0000-0x00007FFCFFF31000-memory.dmp

                              Filesize

                              260KB

                            • memory/1428-143-0x00007FFD09920000-0x00007FFD09937000-memory.dmp

                              Filesize

                              92KB

                            • memory/1428-142-0x00007FFD0A7C0000-0x00007FFD0A7D1000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-141-0x00007FFD0A960000-0x00007FFD0A977000-memory.dmp

                              Filesize

                              92KB

                            • memory/1428-138-0x00007FFD09B80000-0x00007FFD09BB4000-memory.dmp

                              Filesize

                              208KB

                            • memory/1428-156-0x00007FFCFEC80000-0x00007FFCFEC91000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-162-0x00007FFCF50B0000-0x00007FFCF5107000-memory.dmp

                              Filesize

                              348KB

                            • memory/1428-161-0x00007FFCFEB20000-0x00007FFCFEB31000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-160-0x00007FFCF6D20000-0x00007FFCF6D9C000-memory.dmp

                              Filesize

                              496KB

                            • memory/1428-159-0x00007FFCF6DA0000-0x00007FFCF6E07000-memory.dmp

                              Filesize

                              412KB

                            • memory/1428-158-0x00007FFCFEC30000-0x00007FFCFEC60000-memory.dmp

                              Filesize

                              192KB

                            • memory/1428-157-0x00007FFCFEC60000-0x00007FFCFEC78000-memory.dmp

                              Filesize

                              96KB

                            • memory/1428-155-0x00007FFCFECA0000-0x00007FFCFECBB000-memory.dmp

                              Filesize

                              108KB

                            • memory/1428-154-0x00007FFCFEF10000-0x00007FFCFEF21000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-153-0x00007FFCFEF30000-0x00007FFCFEF41000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-152-0x00007FFCFFED0000-0x00007FFCFFEE1000-memory.dmp

                              Filesize

                              68KB

                            • memory/1428-151-0x00000290CE2C0000-0x00000290CF370000-memory.dmp

                              Filesize

                              16.7MB

                            • memory/1428-170-0x00007FFCF63D0000-0x00007FFCF6686000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1428-182-0x00000290CE2C0000-0x00000290CF370000-memory.dmp

                              Filesize

                              16.7MB