Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:42

General

  • Target

    https://perpetualsnob.com/0/0/0/cc38e150840c4acc5c6d74550a498eeb/109/28984_0_101/218530113_161094

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://perpetualsnob.com/0/0/0/cc38e150840c4acc5c6d74550a498eeb/109/28984_0_101/218530113_161094
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc07d4ab58,0x7ffc07d4ab68,0x7ffc07d4ab78
      2⤵
        PID:2432
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:2
        2⤵
          PID:1412
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:8
          2⤵
            PID:3324
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2108 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:8
            2⤵
              PID:2336
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:1
              2⤵
                PID:2460
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:1
                2⤵
                  PID:828
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4008 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:1
                  2⤵
                    PID:1440
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4164 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:1
                    2⤵
                      PID:2888
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:8
                      2⤵
                        PID:1428
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:8
                        2⤵
                          PID:4832
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1832,i,14355064096432068474,9916226833901291925,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4764
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:2956
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4572,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:8
                          1⤵
                            PID:2380

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Discovery

                          Query Registry

                          1
                          T1012

                          System Information Discovery

                          1
                          T1082

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                            Filesize

                            96B

                            MD5

                            3436036551de74ee3988b25230d1639d

                            SHA1

                            8c121d62d83ecca91c63de8c53312bfd4a0335c5

                            SHA256

                            de6335d9322d27686e4cb344b594c07bae8798119327b605654aa9724fdc5d68

                            SHA512

                            c28b02ea16fed7bb6799b3d19ba016c9e76c2a014a76e6550baf26537e229c387ea0ea957418ce34f950bce6e06de9cb6d9c67dede99875f4e079d99233547fa

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                            Filesize

                            5KB

                            MD5

                            2914ffc0f2eaeaec017bcd7b833ab89d

                            SHA1

                            8964da5c6d1d75639031bf0d9a0ebc68752a65d1

                            SHA256

                            2449ec9115334504c54f660aec2c47dd972463d91168378dc7ca51254280ca50

                            SHA512

                            bb238ce3a15a74e623da83889597c0fab79e0004bfb0f82b0a6cf70f312a5525099b745bb504d2c3b6bccd25285cc698bb99d2b622d1e5adda3e60e3c9f81286

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                            Filesize

                            1KB

                            MD5

                            bc2332757553825da009c3f29bfce15f

                            SHA1

                            e4c549bf46437e94750c820b7d3291a4d384b35c

                            SHA256

                            585d67d5d4b8687f18f277ddd6a51471675456e731be26759baa85b06b58a986

                            SHA512

                            e62b7788262ceab5d7cdf39921f6bcc2baf039c2e79593090db0b5dd6ea028c3835d201b599ed8ebc423bb1411afd83fa84cafdc0a313b66407905212e26312b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                            Filesize

                            2KB

                            MD5

                            36d1377ebc12a1e2af139fc1c334787e

                            SHA1

                            9891e5a30cfd6cae5a710b0aef47e72a007aa2cb

                            SHA256

                            024ed3fef306c610f07028ac96a058ce2e9a4924d062f7ea92194f29bcb361c0

                            SHA512

                            9bde3f6b1a194d8615db49bc988a8f9549bb51009f8efc50632ace0211a758034aad5562737a7a629572b335ff9461855f370ce02545f5acaf3a8fdc45bfe663

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                            Filesize

                            7KB

                            MD5

                            52d1961beee88d6c71fb7f09688e5ffc

                            SHA1

                            ee12c7e9f2cd33765439f4590ef4313b0f183dd4

                            SHA256

                            343f7dfec80c747d1c5e2bc45583c27c914a845d22157d147839aa296a41ccc7

                            SHA512

                            2f572f4e096be3a00d1bce024687019c2adac1f8e753193f71869b8d20d20a345f215a1f177af7dee7dfc6d3811221f013adff038e674af012f9610df58adb43

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
                            Filesize

                            72B

                            MD5

                            de8b255fe954d917f45625bf34718113

                            SHA1

                            4f51ead038d00592f68b7b88fc7d8250dc38d7a9

                            SHA256

                            a0ccda0479720fa749bab8da1164e520c8eb3a822714a7928f0859e40ed0c94f

                            SHA512

                            44e12ef458e47170a68f57d5245ce037ce2661c39d3ff7ac578d1e3606bc2c547228f0da3dfac0cc3705efc65d3ed1eded8f77ae8be00fab055aebdef49c0d4c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe584764.TMP
                            Filesize

                            48B

                            MD5

                            2739b928972a1e2a6ad9b03872894ae5

                            SHA1

                            3d91323162b61f69d1660904cd7d696cb038160c

                            SHA256

                            1525cf770a21b86934a938fce554b0edcf6817fc9045d70624bf19e8b6b7360d

                            SHA512

                            a3bee3379ca769d74e5574c05b2a38f295626181e53c2890b0e620c4a2a061e94697df6b0f891511a0e33d5eea6b4cae2a4eaeb67d3d6be924385e366df7968d

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                            Filesize

                            255KB

                            MD5

                            0ba7639b2ada03b3b49a616ccec13341

                            SHA1

                            f5f692cbc892457eb899ae22d2bb0dc0d39d31ba

                            SHA256

                            5e01b5b12c436db5384a50179d7da194b9af1aeeb388b9001f4fdf6ac212a69e

                            SHA512

                            89127d6749395d1b53ec300c351a8e7edcb42abfb8a8d26fa4df92ac238b256e957dc1c7453df160810bbc3994dfc36b95c4ff4392d1bf86c6ae40a73991092e

                          • \??\pipe\crashpad_2308_FHXRYGIFYQCJBUEI
                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e