Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-06-2024 14:52

General

  • Target

    f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe

  • Size

    1.1MB

  • MD5

    ae0b88032d4e1a0f34fa7542797e32f3

  • SHA1

    e9afd146143fe1597c046f430bdb6ebf332ba232

  • SHA256

    f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42

  • SHA512

    75ed97e08e8f78dce7885cc946420211abb0074cc2592e2ca677b5fc8883bdc45d49ffd245f036a64d60a655eed4f6d53edee49f090d0692923670b36f8bfcda

  • SSDEEP

    24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8auw2+b+HdiJUX:2TvC/MTQYxsWR7auw2+b+HoJU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe
    "C:\Users\Admin\AppData\Local\Temp\f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb53fab58,0x7ffcb53fab68,0x7ffcb53fab78
        3⤵
          PID:4788
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:2
          3⤵
            PID:2260
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
            3⤵
              PID:2624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
              3⤵
                PID:4772
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:1
                3⤵
                  PID:4688
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:1
                  3⤵
                    PID:4340
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4144 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:1
                    3⤵
                      PID:3844
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4280 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:1
                      3⤵
                        PID:5028
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
                        3⤵
                          PID:3884
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
                          3⤵
                          • Modifies registry class
                          PID:804
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
                          3⤵
                            PID:4576
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
                            3⤵
                              PID:1308
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:8
                              3⤵
                                PID:1668
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:2
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3352
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:4800

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              336B

                              MD5

                              ede691302faa73f3a220ae57196832b3

                              SHA1

                              342881f5d49390a6e99dd099a74ad60f9c07eeb6

                              SHA256

                              fad413a77a4e7f07a7d987cf683abf9f0ba14e3f2bacedca0e7f0de7f577954d

                              SHA512

                              97c852caaf3363d6dd23f4c98275c16b5ea47cc2eccf0f0c2df4497273931b21d405d1140657ab8af275ecf348018fe77254681ec5fa8e969161be0a457fd0d0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\19195a1f-acd4-4978-a2df-79fcb7fcd3c1.tmp

                              Filesize

                              2KB

                              MD5

                              77cf17f74a5dadc24479a6f3caf313a4

                              SHA1

                              ca4172e95cc06a9604d80011a79f4277ffa448e6

                              SHA256

                              47dadcef9eb7e36581d1a079bf239e8f39a82d15e326c11338dff1b6742971fa

                              SHA512

                              cef4e742f175b0fd913f18e5b1f15d58d9424eaea5d44280cbb76649cc4137e8967c7434e89d6dc1ca9ee857cefcb78dc15b843b9abc03a9ee978e70b172bf0f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              3KB

                              MD5

                              6b94a9c91dea534b0d866b72930a1d2c

                              SHA1

                              21c005d54f243695b3966058a3e9110c3a5d62ec

                              SHA256

                              1841b89b9dc24b46f9d88134218d896fd985fbd1be3da47f2d75d06e46e10225

                              SHA512

                              9c2a91b13b6272d750781692e78f5e8b794f534fa030e157d00e9342533cb9f7da6c2b30c836be171ef1af65e74cd4ca3ef0dd4d1ffdaec6036988ef48ab86fb

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              522B

                              MD5

                              f6118e24841b2c9bb1758eade3558f8e

                              SHA1

                              8bb22c012c560888404cf7e5a5752114aeb980ff

                              SHA256

                              e54a5d3cc3579126dd6bd6fe200688b177f26cc97cb7c5c5f762663491835244

                              SHA512

                              3e35b6ac9f8bcba036af2db9ba9016fe8d0458c79790ef433bdec8f3816b1df15b197ceac670aec3efb2b5b68e6bea9f037886356f6ba3d5482227660f49efc4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              520B

                              MD5

                              c1d067c0c0ee6d3d6422f00c2d76bb9e

                              SHA1

                              a23c46459b4c1efe51e0bf35343b81bf3c5905f3

                              SHA256

                              eb565d04946f4b800eb5f8b4e9febd0b78825f22255fa607e1b561b0dd966730

                              SHA512

                              f69571e2f7ce7c0d40a524088e9f58757dbae7cfbe5c386f8d97e8eb768870066d8b9e8ddd1137cd522af007dcb6a5447935fa5160cb4300242111a679159622

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              d52dce3002d756f368955951b7375580

                              SHA1

                              1fb791666c06f3012148cc6b99d02e9252bf08eb

                              SHA256

                              74adb34042509f40e2f8f8c210b6109b0105ca0bc4b7b48b351baf3c87c5fa21

                              SHA512

                              2d57c2e91f307f1e69dd0d37f86890adff5cd5f826c6e4f7712d680a2fe38208278eabf4c37d424499efdca008855b7e9a0c7a1f8cc5b1bbf3f3a0c675f394fe

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              f1ea710e6ee163d841f0fb1e1e5d3520

                              SHA1

                              79e2b8ca52643b593690a5fc879289ec266c374d

                              SHA256

                              a615dd0270156d962c3957fb3c34b8a0bbe57be826407c0c619b4edb6cbc2d9c

                              SHA512

                              0eba69768ed32a26957d6e27dfedaae3a253232355b087e2fa364ac1b1e943e12d34a2602bb40da4317ef0b8cf657777e4717daa66498d5b1e367162363d4346

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              261KB

                              MD5

                              3c3382d760a446fd115dbef6a11523b1

                              SHA1

                              6fb09a08be3cad1b78116e296b951fa86d202fb1

                              SHA256

                              3f4f43bd2f7c055cfa676e93067ba0a978e855dda0194892f57cd259bf7b0212

                              SHA512

                              5b2fb7abc278e3326fdc9be614ad6da7bcb9408f62331d81caa3305bc8b3a8fdae34ee2777edce500c11270f409ecab386e79907d96e18ea4c05aec361dfd4eb