Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:51

General

  • Target

    https://cloudflare-ipfs.com/ipfs/bafybeidi7ecek2kwz3aeg4fl5tsu5wmvnj3kquog3zbh6t67ilxupl42e4/#[email protected]

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/bafybeidi7ecek2kwz3aeg4fl5tsu5wmvnj3kquog3zbh6t67ilxupl42e4/#[email protected]
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e536ab58,0x7ff9e536ab68,0x7ff9e536ab78
      2⤵
        PID:3884
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:2
        2⤵
          PID:116
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:8
          2⤵
            PID:4888
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:8
            2⤵
              PID:3196
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:1
              2⤵
                PID:1556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:1
                2⤵
                  PID:4508
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3996 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:1
                  2⤵
                    PID:4868
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4360 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:1
                    2⤵
                      PID:3620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:8
                      2⤵
                        PID:4100
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:8
                        2⤵
                          PID:3400
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:8
                          2⤵
                            PID:5028
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3292 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:8
                            2⤵
                              PID:1660
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 --field-trial-handle=1908,i,16031318556008211067,17264426080048619421,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2544
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:4980

                            Network

                            MITRE ATT&CK Matrix ATT&CK v13

                            Discovery

                            Query Registry

                            1
                            T1012

                            System Information Discovery

                            1
                            T1082

                            Command and Control

                            Web Service

                            1
                            T1102

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                              Filesize

                              168B

                              MD5

                              01466f11f53dcb4e4b908bfd4c3a7c22

                              SHA1

                              75915ad3fe0ef9e00c3e847fdd4f3d1c91e00155

                              SHA256

                              fed7f08aff08d72d7fc6791514343ee9c5cecc8b28d3432546eef8ee7e52ae42

                              SHA512

                              7a98a11a4bafc1fb85a1698e36b57d0218e716393e194b68f2c6cf5cd3971c39b63a689be5d2eea792745ed098952f0917f550ab8eed0409aea8f88828c6773f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                              Filesize

                              3KB

                              MD5

                              99edc77ee7edfc482a84105f0bf3171b

                              SHA1

                              0ca80ad0eab2157e6222b271ad38a1bc2e2229cc

                              SHA256

                              d84e6d47b320abeef66d4d8c28bbd292e58ec48d614f60eb200f22b8f9f2fe02

                              SHA512

                              eab577be17978c6e3d5064f8dddfaf0cc520b14c3caf8db7d210774c12829b8a8bebc9ed79c7ebae05a88ac52f46c8781a47cb81df8e1aababdbdd3374065f33

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                              Filesize

                              691B

                              MD5

                              e51d804ccbd1ca8bb722fee74a69d8be

                              SHA1

                              b9e1e63cb856be6b26a6128a67d7430c2cf08905

                              SHA256

                              06145148811b471e22bd8f9c765a470dac5a93db3f19fd3508fef0e3011de2b5

                              SHA512

                              d36f9a8c84f181c880d869b89a787ad01cecdb22b1c6066d6ea6cb8d00fe7f369cf3bc31506efdbe01c76c1f5a1b935c19edf0f072d914b2fbab649c1e064da1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c3d67b7b-3db8-4d8d-95a8-d1a12323395f.tmp
                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                              Filesize

                              6KB

                              MD5

                              da8a69c157882f3d4abd696a32573feb

                              SHA1

                              210ad91c509308bfba8bfab019f50c274f8b26c2

                              SHA256

                              ad34e09686c963ce37814b76aad3b457dd373dbd528850ac8b47799f252f9fb4

                              SHA512

                              4524daac98ab72eb1762a651d1f68c786c930af9a609e3aeb432b26a5506024890a61eeaf6d8f780a2a506760eba30fd7a0e2745cba41cd6dc8b4e56a786e8be

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                              Filesize

                              7KB

                              MD5

                              23da46484d2dad3a623c349559e1d4f8

                              SHA1

                              ffc1b8a5df80dba222b631f5f40e28623d7443d4

                              SHA256

                              0036d3679ff3f85f1da2890de60af9b5433fb31eb2fce38d15b4c2ec25cc9e28

                              SHA512

                              8e47bd3c4e7922fd6ace1846576c19b29481e1fd9f264c51ec1237ae43198432eaa7f0f278d25a609495a8a37448464884e27463a691ea4d49b8efdf6a76415c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                              Filesize

                              257KB

                              MD5

                              d16f4c002fdd1778aebb970bfb1831b7

                              SHA1

                              8c07805f148c0791bee0e9cd3e2c48fb6997a7d2

                              SHA256

                              b2586a1c473b152b946fbe497e9dd23c3e7edf6824174948caf25d53014784aa

                              SHA512

                              b2bea2380d08f67b931634f310bc95055840b5c299dabce5b45df7e471317f4e695e80ee220ac051be1536aab0b0a4252d703e32ea85cc613dfa42bf7de7627c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                              Filesize

                              257KB

                              MD5

                              9fb2f06e54761483e36bca56c6d117d9

                              SHA1

                              1f6f07fefba4ec6ef5cb0879e4bb956fc164964c

                              SHA256

                              ebc0a2ad4e99db107b027736baec0337b462f5f1f4123c7f2a2de53456e71172

                              SHA512

                              339bc291c90e107ff5276d75731ff850e04e875ca35fa71f3a3cdb6ce2833613e1124c46953f87abcfc6fff7d15222c65853895cb5d27c69a1d7691073e9ac60

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                              Filesize

                              257KB

                              MD5

                              58ca78d5f84f746bc5f701b96298f0d8

                              SHA1

                              5322265af3496f8e3dda060bb26cef06e0b7929b

                              SHA256

                              e201458ac8f454ee3229e471ac12c3f803c7b4bbc92bb4554192fcb468d7497d

                              SHA512

                              b934633ed15815efa1550b7a83e0c00909632a1efde73780083e24a0f37104a45debf05a164dff3f3e6e7fa9d11eb5cf5c1583a4a018137adc89d436b58b1453

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                              Filesize

                              277KB

                              MD5

                              90736a1283b22117dfc1386a2e037b25

                              SHA1

                              7f6d288a3df63ce782363a1ab4d5279f486b379e

                              SHA256

                              7d6c528860b96f2ed1dd8f9085ec9b0dc5e47fdb208704013c3988b15cd00623

                              SHA512

                              b023deea506b597a1b83faf12b9530589abbb5fd63f4bbeaa900267327e6fd76b874a199fb6ea013ab848e71cc20cc6863aab30677c551d5e1d32d907808e555

                            • \??\pipe\crashpad_1780_YHHXBPZKOLYEQVYA
                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e