Analysis

  • max time kernel
    300s
  • max time network
    279s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 13:27

General

  • Target

    https://redirect.viglink.com?u=https%3A%2F%2Fapp.smartsheet.com%2Fb%2Fform%2F3c36d3ab3fd24468817b0ac443a03b45&key=a7e37b5f6ff1de9cb410158b1013e54a&prodOvrd=RAC&opt=false

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://redirect.viglink.com?u=https%3A%2F%2Fapp.smartsheet.com%2Fb%2Fform%2F3c36d3ab3fd24468817b0ac443a03b45&key=a7e37b5f6ff1de9cb410158b1013e54a&prodOvrd=RAC&opt=false
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc03ab58,0x7ffcfc03ab68,0x7ffcfc03ab78
      2⤵
        PID:1880
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:2
        2⤵
          PID:2460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:8
          2⤵
            PID:1320
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:8
            2⤵
              PID:776
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:1
              2⤵
                PID:4196
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:1
                2⤵
                  PID:324
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:1
                  2⤵
                    PID:2160
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:8
                    2⤵
                      PID:8
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:8
                      2⤵
                        PID:3756
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1916,i,16609728491932934163,15673627342740481627,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2244
                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                      1⤵
                        PID:4388

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              72B

                              MD5

                              e54073b3f431a886d2c71f1d5f966d71

                              SHA1

                              1643c0dd3df16f485f3022efb3871a7321d7b75f

                              SHA256

                              775ec7c096b01d5cccb87dae029136b070eff3fee44d3e4fd97b885ca3c4e8c4

                              SHA512

                              b5b29332261bf66a68642c54ea3dabfee778141b976ecb81102044a9bb46a034d67d7e176795e7eb2699e5a93b4bd4d351788b6166ee4b6850ef4041995d5a84

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              b47fad696704e132418dd9dcb141cf9c

                              SHA1

                              59b938278466f3b87945de9875dc4765d507319d

                              SHA256

                              91549d7d4ecc5c733fb3e6cf41b8c26cec345510995df8aebacf060bf6eb5448

                              SHA512

                              59830aff157315addc1f240bf3672e34fbd46ecd342ca627e65b72dfb0074b5e751be6cb116c2465b926a5ce2ec07c77a2ecedc921a75d3a5d748941835fcd2b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              5c0754bb22b54734d8399fb81ef6a578

                              SHA1

                              8adc07967e8c99913953ee1272828c9d160a1679

                              SHA256

                              fc6db88f57ef98a912667b2bf3ccf301273dc8bd5bfe9b094e8895f3355ec311

                              SHA512

                              2bc4b5abc7f788cfc08dd054e29d834ca1918f2a241a224c8907a9a246505a733b8a22cd71a2e44255b1885bb5469d280fb11e5748cb0ed8dc92cd577b0e2886

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              856B

                              MD5

                              a0b5a4fc9a80e4a3b89c7848ea09cc63

                              SHA1

                              dbf7c3bdfa3a0bda6c730712f9bd08466df1a5a3

                              SHA256

                              24693df272a25ce451e398100603db66abe7cc37990117740b57d842cc96a121

                              SHA512

                              b0fad1b7eb787cc2b7811113ff6de2f8662b1b43d061973551d3c8bb3c75552e8dd49ac1944e4f09cc5a24e9ee1b564cd3bbf85e75480772d3aa2f5d048ccf56

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\d130602a-b83b-44d8-8322-cd29c2ff0a33.tmp

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              056942c5fd84b56a44d491fea6d6b6e7

                              SHA1

                              95bf7258e4795c756ccb3ad2a12642341b4574a7

                              SHA256

                              4949bfdbdce434215c2d6575e421ae96b430a1f16a9f475b820c90b1b82361f3

                              SHA512

                              2fe77de670b8fe8cf9fecffcb96e6616e7219e514955ea7fc2f525352b499ebd4850150361dfd56db03b671d44c0c4024dda3d8930f527a5ba79766552e19087

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              5a0ae443c499635f3b97b127a6a46fb4

                              SHA1

                              7965b37e1baf9e6528bf6ee1ae2a98db9f9b8042

                              SHA256

                              75a915c487d97b5fdabda3e188f59089a96be1b912679a36383242577db9dcde

                              SHA512

                              8ea2a1d4423f2236cb46d98d62fd7434d696e08d62de24441c1c80458be87f1cbaa303092a82f92baf01b53a6e936226be549cfd6f28dac2e5297dafdef2cf48

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              45a13077935be7977211fa9a01008818

                              SHA1

                              b09a46eab75557f42badc85feaf4ce35ceb4aa2f

                              SHA256

                              9eee3c4c4c6d60bb76b4812d87427d13f110fc9cf4f8a453704d64d42b59ffea

                              SHA512

                              43088505a2bc8cbd156516af567214d870c2f5c2d8352549f26f71fe5af827a058efa90daeece34e9d6882f92abe3a9b1ba431cf4c7e0299ea6c48a0fc7f4913

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              130KB

                              MD5

                              f3874a340a59d2e1ad891a2aa99cf86c

                              SHA1

                              a915930b997c2a5eef84eb3e6f3da426a274a1c8

                              SHA256

                              332ada1a774d0e408cccd9dab3bca852977c73c1dc557e08981dcba9631f4a5b

                              SHA512

                              61a2696f4b954ca0dd057e649f715ffffbc1c912fff4109b2d93f68d63246393be2359b97d5a2e94c2b65ea07530d72779af285784f1ecfa12dc570fc4876bee