Resubmissions

14-05-2024 15:54

240514-tcahlsdd3w 4

14-05-2024 15:52

240514-ta6s2adc6z 4

14-05-2024 13:49

240514-q44nzsaa25 1

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-05-2024 15:52

General

  • Target

    https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcfa3aab58,0x7ffcfa3aab68,0x7ffcfa3aab78
      2⤵
        PID:232
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:2
        2⤵
          PID:1800
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:8
          2⤵
            PID:3960
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2164 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:8
            2⤵
              PID:984
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:1
              2⤵
                PID:2108
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:1
                2⤵
                  PID:1484
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:8
                  2⤵
                    PID:3304
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:8
                    2⤵
                      PID:1000
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3756 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:1
                      2⤵
                        PID:1544
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4412
                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                      1⤵
                        PID:3564
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:3388

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        192B

                        MD5

                        5925d27d6a43bbebc5c34769c1c8510c

                        SHA1

                        abcc51839e620f6696f9b416ffffd6af5dba7a66

                        SHA256

                        5d13160cdb79bd2c204096ab20cf3700d3de2adb5e270bb9f8002fed83afcb17

                        SHA512

                        bd16010cde856c2dd7044094c675013c941c70b39cb9af17cbfe727f16817f94e612320dae55678237071b6b81164b577cb2645e9c778c80abab43fef79b5770

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        43a15c294af9b1f9d99d20783dd11724

                        SHA1

                        b0ddb573be37fe994f014e451519436cade89770

                        SHA256

                        8afe3ca23762cb159e4c1ed7d5b0c878021e28d30ea6cbee414a88338f58b7fa

                        SHA512

                        2f8c915820c8f25b85606c255b3a35c7b10334cae399dfeded0099e2dd37149794808bb3fb6538c09cc5eeeea5bb6f973d92de36053ba8add58552390f5cd9df

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        692B

                        MD5

                        c1eb80c8d5b2131b0cb343e3039c5edb

                        SHA1

                        0c4942df464a5d35f089dfe785e2b5157498a044

                        SHA256

                        3f1280d0cd5a1d3219c5818f202b02d5445f5cfc8f43b36b9e6e932080e48a69

                        SHA512

                        5c5214e183b2ad8cccddd80af0f19fc2dfd608be471ad1c188027b8a68318d5afee0f4f3699c65b3977af102ac65e0965136acb5b1a1b712b34d893fba97e823

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        7KB

                        MD5

                        32c8fed4f9815bbc53f0d0811c03559c

                        SHA1

                        6b05e7b9360c6119444ff89bb48e94a7c297bf99

                        SHA256

                        a54c2a99251e3b7a070b2ba5aad62a5dc74e0c0efbc49b0cf246dca8e8ccb5ff

                        SHA512

                        b1326e698b35bad112b235ebd7d37a72bba0b2e57356bea49993ac33123ee0ea592af47d6be81e758d65b8671c66f8be5b3e65625595d09a6a6927f17fdbe068

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        130KB

                        MD5

                        a0f607e2b73243e7116a64a8adf6e37d

                        SHA1

                        e8e54d708069a2c4f400e555f0afae73fca8ae30

                        SHA256

                        4cba1918a677ef5aad666b783cfa853108d2405f25dd3b412ee4451c875ad56d

                        SHA512

                        477d4b6b649a37854b6271999e8b5a4733c4c33f2bf83f35562bd7d2a79392b7943e293345b6ffb9fc43d7314614add582c88771b6ca1770b19b64e05a186d98

                      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                        Filesize

                        10KB

                        MD5

                        2cb9e3f89741961748d38d15dfecc8fb

                        SHA1

                        11f89dfac73dfacb194fa01bf6e7fddb38c1f6d7

                        SHA256

                        e76dcf1390543fde2ae6fd8263e90df10923df9dfe78a5fb588a50654577fd13

                        SHA512

                        20557311d13320d2f7c8bfb99e49c8af30dbcbace0faaa5101f9ea893a017a55100bf2b3c466c9d9cfe4fa8a8affcef9223a870abbcf571492fa90abd0e748f2