Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 08:50

General

  • Target

    af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe

  • Size

    1.1MB

  • MD5

    65b0afa5ac8b0f7b78bbd0632f88e405

  • SHA1

    727de9a0f448ce7f43a18760c969ff16ece33610

  • SHA256

    af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac

  • SHA512

    2f28599f67b6528ca0905662cb2d1cd51e25dcb20675597de65cea7b2bf16498a27e9c30bd2ee7b70388c79d9f8fce876e5ee04c559135660b7e832ddfa46522

  • SSDEEP

    24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8auR2+b+HdiJUu:GTvC/MTQYxsWR7auR2+b+HoJU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe
    "C:\Users\Admin\AppData\Local\Temp\af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff9368dab58,0x7ff9368dab68,0x7ff9368dab78
        3⤵
          PID:4996
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:2
          3⤵
            PID:220
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
            3⤵
              PID:4944
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2104 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
              3⤵
                PID:3944
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:1
                3⤵
                  PID:856
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:1
                  3⤵
                    PID:4276
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:1
                    3⤵
                      PID:1588
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4092 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:1
                      3⤵
                        PID:4264
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4560 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
                        3⤵
                          PID:4604
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
                          3⤵
                          • Modifies registry class
                          PID:3112
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
                          3⤵
                            PID:3824
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
                            3⤵
                              PID:3564
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:8
                              3⤵
                                PID:1948
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:2
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4220
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:444

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              336B

                              MD5

                              44a77eabb309094eb2d7b1153d95a285

                              SHA1

                              7362bb56212dd23cb47325ef7aa9d94c5b6355ab

                              SHA256

                              43ef70fdfdeeca9266e73e1fc559ca6cd78eb81ef6aa66ee7fdab59702b9d78b

                              SHA512

                              41304855a3eea67a2017cf34e64f2beaaec0c59bd94dd89616c68851264648b0ce640797adffffd973efd39f75ec32e0404cc2fd9198e2c7ad367ed32e5a03ae

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              b5b2eef600837658d6f92f685c5db042

                              SHA1

                              32424b585e9a405bc19bd490a0104348ee29433f

                              SHA256

                              6e180df4e110d9c8833c1d303d23d6ce002f679be11f5972a6e7c04338a65aa6

                              SHA512

                              4837aad1cf5599214c005504af280d8e3296607920bad4e23408e11f32888cfa83377d2d4675f2c86858668b2adc84adfeb3e537e27b85a81ce11c13dc670b4d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              7cc02e4d74a29b9067996666f2a6abb4

                              SHA1

                              3a10405542027acd91429ad7df824f17cdc0c68b

                              SHA256

                              d5ad19e615663ca869628eee83c7a9dd8307ea5d822f6623b29c2cb5de174273

                              SHA512

                              210adc4391a4d294bc52846c78bdc88497a0ee50febccaf6ec5486206c1064bb674329a5baa0e7025d9d796dd7100e85978b7f5567353011153a2dbd9b958d8f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              522B

                              MD5

                              80161e61258186f067ae53851d1813c7

                              SHA1

                              5080fbe6d83d913cd13b13f3d8178b46bf49d905

                              SHA256

                              7e9dc2d1dfa2d0277d6c5a9502fa6f591e23161ebca94a12d12096ba852f0e80

                              SHA512

                              231ca250ea9428bc9ac382ba9cc3457da2c644054830123bead24a03da4209d233f51674a767e164229e4917a179c6d23d4b3e5b2d0c75fd222cddb43eacf665

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              524B

                              MD5

                              dcb687fecfa91ed97ac5913920b69f9b

                              SHA1

                              cad456e5379681a3016dc189192c32fe67f36c4c

                              SHA256

                              941285d9b4934c7b0ef2367177f3292c8da768e9673efbd7c54fac549c3ad42d

                              SHA512

                              84eead513c4f362b5f882b0fb399d21ac4b73b3aa934afbe6b865b97a07dfb002c988113be39c825541c8da63eae55404c06ce4065db6100060b4836b3ba12a2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              74d6b3bf81f3d6919bd6c8aeca9f102d

                              SHA1

                              adc8dc7fc014ff3ca289fb6b6e55e146c1c3d8b2

                              SHA256

                              016b837955342a6b4b88336dc293d1bd9e4f370c647d03044f311d37def16a98

                              SHA512

                              293ce9f65a8ce7995e8ccf8b4f88799956b2e164820017390509aefe30603adfeaa512943749daf88221b4bc20889b78cd9b8dd714126d85cb73807fe276d7a5

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              0e016ffc1d2d5cef61dd90e6601e4246

                              SHA1

                              3d7327c308e1dabfc1dfc463d082b37d7e1dac6c

                              SHA256

                              d5cf5a1b5cc59fc9fdc7fbc52f54450783563014f9d0c00e0ec820d388dd099e

                              SHA512

                              41d4f3ca66489e6d0f20c0d6d12566ca051ec8c062b90f64f446e300289b123f473ee679a2bb076b70cde8d3c69a2f7544a361152e54312421e2756965b33378

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              261KB

                              MD5

                              07347de3c1ff59183f92b63a40845556

                              SHA1

                              52828c7f3734607b265d37da240c23e45d254f65

                              SHA256

                              d171559ee2e83b1ef2ffdd90e4b275fd69f4be460123c14664ab66ddac65224f

                              SHA512

                              57ed62d5a80a4d5ad736b9c481f82c73804380f1ff39e5135da49399956cbbbaf0e607894574cb1c0be71e08b3757dfe32cbdee6e826fd79d23b1f51f4b5ea7e