Analysis
-
max time kernel
34s -
max time network
14s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/05/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
dddd3.exe
Resource
win11-20240426-en
General
-
Target
dddd3.exe
-
Size
89KB
-
MD5
c54b481bb47135aa63a8cb41f9d9d224
-
SHA1
4cbaad503d0480a3803fe9034bc47f0682293a46
-
SHA256
d16c7999b80c89d6c9db473e0c0c6be084c25b43aef5b66782680b85180d4f61
-
SHA512
947f749d4188488ae1c505cb9cabc5ea67a6b668e80c2a169ca8be8bb8843f3e5c4a10a72d4ba48cb8a1b357bfbbc14bfc3518063b05aef2089f81cb8481e59f
-
SSDEEP
1536:T7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfSwMOA:P7DhdC6kzWypvaQ0FxyNTBfSF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3184 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598097379072335" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\0B3wfn0.mp4:Zone.Identifier chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1428 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1428 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: 33 4280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4280 AUDIODG.EXE Token: 33 1428 vlc.exe Token: SeIncBasePriorityPrivilege 1428 vlc.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe 1428 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4788 4760 dddd3.exe 80 PID 4760 wrote to memory of 4788 4760 dddd3.exe 80 PID 4788 wrote to memory of 3696 4788 cmd.exe 81 PID 4788 wrote to memory of 3696 4788 cmd.exe 81 PID 3696 wrote to memory of 3140 3696 chrome.exe 84 PID 3696 wrote to memory of 3140 3696 chrome.exe 84 PID 4788 wrote to memory of 3184 4788 cmd.exe 85 PID 4788 wrote to memory of 3184 4788 cmd.exe 85 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 2608 3696 chrome.exe 86 PID 3696 wrote to memory of 1240 3696 chrome.exe 87 PID 3696 wrote to memory of 1240 3696 chrome.exe 87 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88 PID 3696 wrote to memory of 1220 3696 chrome.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dddd3.exe"C:\Users\Admin\AppData\Local\Temp\dddd3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\565D.tmp\565E.tmp\565F.bat C:\Users\Admin\AppData\Local\Temp\dddd3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://images-ext-1.discordapp.net/external/KTiCUUMhBcjMkKJ9Cf2FZLwqDRv1Mba_RoCBeANvBK8/https/i.imgur.com/0B3wfn0.mp43⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd0771ab58,0x7ffd0771ab68,0x7ffd0771ab784⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:24⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:84⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:84⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:14⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:14⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:84⤵
- NTFS ADS
PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:84⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:84⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1768,i,9827328777329525963,4642811335079097310,131072 /prefetch:84⤵PID:4304
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\0B3wfn0.mp4"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T /53⤵
- Delays execution with timeout.exe
PID:3184
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:892
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004701⤵
- Suspicious use of AdjustPrivilegeToken
PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e9de9ea8c7c4528212f224f5ee851aa9
SHA1370a34291b6cb95848c43ae6b43f9457fe57bd5e
SHA256322eecb979cd8bdfbd43dd004f3430adae013392e37182a19fb0e19b1819e31a
SHA512451b910500c471d4a034eb497f673347be09c813a1f3f0eb6e3a6f621b6284959b3fd07e2bb05916bd9592935da38951c8d465e6d8509c3e223be1da3e5a65af
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5fb519bfbea1b601b831ddfbc766149e1
SHA197433418b8961e0d6e2dd22a257c663dc7ce0152
SHA2562d22f0cd7fdc3e9f35c8344f460f27525fee7cca5718744f05a48e8452fea2c7
SHA51229a6bb0581f4473c3894063f0e17b2331ad0698dab2e47d8f9d96da6259bf458ce9e86dfdde7a7f77e21c4d4ca631b364fb909fb9635ccf0bd1684e2aa5aa0a0
-
Filesize
7KB
MD59d006997965de4e3877cf6af49990e51
SHA10b9dba60aadc6d412dbbf4bd3b85971adebdc965
SHA256008fdeff36b863803f7614a227a1d7ae8345f88c6d996b1f85893e433639ade1
SHA5123cdc5fa1ad19f05cc1ebc68b037363565312e03075be4c10fa5720a4fb63cc241e9c62aa9b5e45d7ca672ba518e4f160b609ba13e1868a95b96cab3da20197a4
-
Filesize
256KB
MD50ded9a696e99285f53b558a5730f7843
SHA118f162302722590fbfee2ba1c8ffe39099e0822c
SHA2563052f813de3749c8b624c130e517c4952e702324434cab2c34b0ff566b5b1ddf
SHA512113a5f7597bc1fc8b71af618f9b8a885ae194e0e3a5d0720447d19be205f89ec6637f24bb68705f0b14a9636558618c25498cb08fa222a23de070795c459e181
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
176B
MD52d34d362da00c7b06dd543582bbaf08b
SHA1804eaf3f1aee1c0872a0428e7aa1ffcf6d3552d5
SHA256fdc14539fc049ab2aa660dd82f046d32c8c6bee046f50c77a24ee082d0333a24
SHA5123553ab673beb20fdda9caef286a2c187084c7390fdc77d0f9dc3edd513507fafe9740a408548f91382677ef5081d729a91face6856608f96dd627ac3f3c7fb83
-
Filesize
1.4MB
MD5333da7a632ec4b40f0b2e9187d4ec758
SHA1a1d091f2e2eadccfa1e35a913636b8527b1560f3
SHA256b52845af920a74a39ed4e0460f3654f737da93f5638189921c9f01984bb9ef09
SHA512c4540dbdbccad3745984d0160e08e0be78052338f0af45c0ed4fd05036c7b8902aad8a65e5482ef9c4de10556ea2e8c327188a974e4fe74024e27677b4f7c6b4
-
Filesize
154B
MD51f53b03319d51cfd614bac7a55c77d27
SHA11afea61e30c4b9b0c2797f7861d40bfccfe03041
SHA25623c4085acc7328833c96f5ba590b88ea297d95a2efe166f5a89761ab544e4df7
SHA512ba72dbc9da71ccca47ab9dae8a59932efd2a979ec13b1c0d7f22c5a4b8c2d59a6003c67b340c46b3432ac6b6580ca5284073bafccdb415ace9fd619e20b23272