Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 22:15

General

  • Target

    Small Malwares/1000013001/8f8936a9ac.exe

  • Size

    1.1MB

  • MD5

    0de37e7a20ce5696d649752dcaaaab09

  • SHA1

    e6fd5e7adadbef55f5a1db449e728660e43e3353

  • SHA256

    688ddaf6044eb7a587a796211a5e418c0aebef35a91f5d4d2b54674bfa5ed40e

  • SHA512

    5fe2e34271c78a754092785a2f5f8fdd7572029829d9ac0a5092778e3ed2c795f04adc4ce2b3b94023749abb5a16fb50d1a40758f724d123b2f8cde9ce7f59d1

  • SSDEEP

    24576:0qDEvCTbMWu7rQYlBQcBiT6rprG8au52+b+HdiJUu:0TvC/MTQYxsWR7au52+b+HoJU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Small Malwares\1000013001\8f8936a9ac.exe
    "C:\Users\Admin\AppData\Local\Temp\Small Malwares\1000013001\8f8936a9ac.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b89ab58,0x7ffc0b89ab68,0x7ffc0b89ab78
        3⤵
          PID:4000
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:2
          3⤵
            PID:1680
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
            3⤵
              PID:3552
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
              3⤵
                PID:1940
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:1
                3⤵
                  PID:864
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:1
                  3⤵
                    PID:3668
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3972 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:1
                    3⤵
                      PID:4852
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4112 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:1
                      3⤵
                        PID:3820
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
                        3⤵
                          PID:3900
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
                          3⤵
                          • Modifies registry class
                          PID:4780
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4936 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
                          3⤵
                            PID:1052
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
                            3⤵
                              PID:4772
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1912,i,14039602046342405603,13734614859333577930,131072 /prefetch:8
                              3⤵
                                PID:3940
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:2648

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              336B

                              MD5

                              73e0bca96fb85d3fa01ee045cf62ef1a

                              SHA1

                              3b55a631639e4fdb4f7e3398e23e06be1532d12a

                              SHA256

                              ad1a454a3b7d5c389d7983e8699063cf140b1a780e965973ce161df91c7e387e

                              SHA512

                              5d8be6ee00f98ab2e2b2de86f5b1c8c220ad2c572d9f2ca182991f0ed64d0929d2fda010d86b13c949747b9099f37f0bab4d2a152271a5c827b06bb5d466d760

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              524B

                              MD5

                              fbcf0003a18f82b45a8cd96fde16f678

                              SHA1

                              70ce5a912bec10f9e5c256e9175234c6eb5f37bc

                              SHA256

                              95a40eeaaa95ec6ab46837ef06b1f7ff222213f8cb8a6f9176804f351c079dbf

                              SHA512

                              071f8041be625db02689e310a33325ca75222bbc3e2667bec553f9e80bea6ab005c94209945fda1726c6a98d18b61ad7e1d0d575488eef8518de7e80bcea63cc

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              7668081c38b58ce7e4e17459c2e4d741

                              SHA1

                              44e6b7368f9ded017a610225fd235fa1cdb86640

                              SHA256

                              43e579b32b4844bb0b155be7e64296220a1d52abcb9699b27613a399f87011b3

                              SHA512

                              040a02c1373561fb6decc1e4c65d2bf3bb3d0eb0eff0ad05622d1e115292225622c7c6359577c331bc8136ba58130ec2faaf460d092cb84f683398bea6c4305a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              58f1fc8d86b31e8a6df134954da0b060

                              SHA1

                              b7cf813374db36a5d19780505bfd2b86c73563f9

                              SHA256

                              1419077e1c63cc212e1244dcc9de02ee792756748c3e5e81ed5d90de3d07dd53

                              SHA512

                              246052baf658d6a00a31731217f5456fc608580c5b84a05ccc4e30e83c5279e42d76b946e01f65f009c36b88566ddc2d085545f20a5ac2677a11ccde6d941387

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              263KB

                              MD5

                              d49604deffd9b6c422cb667dadd71d46

                              SHA1

                              026ea3355d113b12c5c6c66abbda2aeed89066eb

                              SHA256

                              85146012b049a7f5413103b5a949ca078b45dd1e3a99d2bd48120f7c4074e9ed

                              SHA512

                              91056d08ea5cb0e37dbda04a1eafa3c171e9ca0d5547f6f11b7523850196a46a2763e5ffa8035eb5d109b108f1a18fbf24aeadd4d5f72ff5525539f925d0f3ee

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              257KB

                              MD5

                              e3939e5446c18d1ffcf2f36bc1de7adf

                              SHA1

                              00249f931a5856cd50d9d3cb3a3e80e93f32d24a

                              SHA256

                              a6410c5d4ce8170f84d02ca3663e6ca8f5ddb4bea6c7b3e7f34612fb352b0004

                              SHA512

                              0eb7f9b5287550abf1dd2fae06b8b04d5086ad7912f4b5f39aac52dea78c949891d780d1d2097ec9beeb57cc5bf8781f99b6ca4092d76cfffb3ba90ce330f27f

                            • \??\pipe\crashpad_2572_QNZBVFCHOOCFBWCV

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e