Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-06-2024 13:48

General

  • Target

    Serv2er.exe

  • Size

    37KB

  • MD5

    7399e9dc556bb0ed6d6f40099d7f1b7b

  • SHA1

    3931dc6900801357aefbea779c132bed93b604d4

  • SHA256

    f37fba950c07e066747cd5a83712f90d58acfa5f658306a016f9ae290b87766b

  • SHA512

    8907cfe5a9457abcf27cf3c47162f8bfe233aeda2de68ec6b76a04497d59a5aea984da759aa564dd0ec0fec8465da483c117748a29c0d6a005e209a64a1767e1

  • SSDEEP

    384:0KjoUiFebK7FmpE8QyEfuifpefHCwHrAF+rMRTyN/0L+EcoinblneHQM3epzXHrJ:Ft2n8LEfuiAvCurM+rMRa8Nu1r7t

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Serv2er.exe
    "C:\Users\Admin\AppData\Local\Temp\Serv2er.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Serv2er.exe" "Serv2er.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2672
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4800
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffcd3c9758,0x7fffcd3c9768,0x7fffcd3c9778
        2⤵
          PID:788
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:2
          2⤵
            PID:3076
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
            2⤵
              PID:4780
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1992 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
              2⤵
                PID:4680
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:1
                2⤵
                  PID:4592
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:1
                  2⤵
                    PID:3168
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4432 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:1
                    2⤵
                      PID:1888
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4596 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
                      2⤵
                        PID:4504
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4728 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
                        2⤵
                          PID:2220
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
                          2⤵
                            PID:2284
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
                            2⤵
                              PID:2704
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4596 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:1
                              2⤵
                                PID:3372
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5036 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:1
                                2⤵
                                  PID:2532
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3040 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:8
                                  2⤵
                                    PID:1232
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2916 --field-trial-handle=1864,i,8928003215654428647,5928760269303095628,131072 /prefetch:1
                                    2⤵
                                      PID:2712
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:2092
                                    • C:\Windows\system32\AUDIODG.EXE
                                      C:\Windows\system32\AUDIODG.EXE 0x3ec
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4608

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000b

                                      Filesize

                                      133KB

                                      MD5

                                      7ecfaa9433c767a2afcebfe0bd64e321

                                      SHA1

                                      b145f3653357dc209b323ddd012098ee850c6eac

                                      SHA256

                                      8f075530427e7f894b4f779e313dce159f425d0ad6cbc5e752a109df3e9ebb60

                                      SHA512

                                      e02c192e14ac4da210b2a757653189f1f323125bc946e33e0a9d7a1c7cabcf5b357ed7f55386946703fcde4a5d30415889155d8cbf811cb6287c3f42e6b9dad3

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      792B

                                      MD5

                                      d7cd1c1db914fa38c979792a3406904b

                                      SHA1

                                      4766780dfc3c9b73850b30dd0ab899a5431151f5

                                      SHA256

                                      f240a47a4fa6b30d799ad98c80daecaf829edbaf20e457050d3388102d334407

                                      SHA512

                                      46f97644377faa799d1cd6f5103f1103a7fb0a7e5413cae9779b3c5f01fa444befb292a2b90a94582bf27c772e96cbc71608d2039fe7fc7c32abe9fa1f8194de

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      672c93cf0fc3bb49e8b80c0f2d415c85

                                      SHA1

                                      2c85e31f6d396337e28d7581a5b16f050150d6cf

                                      SHA256

                                      8e4f9f581a6df3a0d88ca1d088272fbab06019695c2812acbe1712d69e2be29d

                                      SHA512

                                      78de2dbb773c84fbe3fde04896699fdb3f1cf191fe5e49ae088566404977683868e5e0603b06ea1f08acdb51a81267cdc2594322bafa1b9e0191ce18bb0ffabd

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      539B

                                      MD5

                                      77266da77fef7daf8a0429b2b75d7830

                                      SHA1

                                      58c0d57cc8ebca782fe0f07e0b7409100b7c8fd8

                                      SHA256

                                      f35081c818b17ebf3ab22d3445f998019612ee92512f6f9de8b823d2207db09b

                                      SHA512

                                      213d3531dc06c8b3e04e29c667afed257ff891fd31832b95eb44a6beecdd7f205276a73493fe8ccd8cd89f06ef642541f0a0b0dd8e28dae9e87ab7531803113f

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      539B

                                      MD5

                                      4d39612e0f446636b5cccafa524c0bad

                                      SHA1

                                      eaf9aae4b515c0f0e707299eab43e6e89eeef86e

                                      SHA256

                                      f6e08f4510e47819cde0c31e6823048f580ba72c39d09cd98d94c4d75d608924

                                      SHA512

                                      6cd74931ceacf5b6179a11e2b1c0abb3f34a528eeb3d96a5d16d2771917f64ee35c01c25a042118dc54fd5418bf3594d27f16db2b1c4754253a4fe5f48da7022

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      c2bc10499a030427b124caa8c98f2701

                                      SHA1

                                      25da215348a5609af3acc77ce5badd3942888f37

                                      SHA256

                                      16e701b7d6990ada31c63924f85c19d4abc9250ebbc3936375a84a3f568b6745

                                      SHA512

                                      00fe5c25e218b7f5f7a9f10677bd4990ecb2924d974bc32d4fe11023b5f381ba2587e855b572702cfbc89092a23a64e05de395b1b12a63aab068680db81d403c

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      a3607e180e9d3f86ff2bcef2cb4d6bfc

                                      SHA1

                                      82ca123e54a52617fbf97a0c74e34968eb84b9c3

                                      SHA256

                                      8296b17198b3c18a000982e40a2e14d1eb520e38bfa77bcc897d4e4c59a07b6e

                                      SHA512

                                      31a8efd07bb569c4966109a076fd7b376c8323fc11cd2045e6a0c9152034b07a55bd910f9333f821dffc1d22342429e1b15531af94927f18c9083680ede7652d

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      041ffb49a855c328f2c91f6dbb5c371b

                                      SHA1

                                      370647fd5022b4543bb94d86641892ec8a51e718

                                      SHA256

                                      5e9e590f8b2bc77a1962b4bd309bc909620616f37ba75f7bf907aa7b1570a412

                                      SHA512

                                      ff5a037def754d978e243c4474a5d8cf88bfa9538b91539378f03c6f6420a06e789b983f9f64426d57ec5541ce9d7d738c6531323de98afe10b47f23e2cb424d

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      280KB

                                      MD5

                                      67a8ff17923e1f6b7028f1c44bd257ba

                                      SHA1

                                      ffc130fa0a8100814b86b915c3f1269d74acaae5

                                      SHA256

                                      fcbfc00d11a3d40a401709775f754520129fdc7d5f899f28e9e80a8044dd6177

                                      SHA512

                                      b5db5f6a5fff02ac7a840301dd2b3565cca8829fe2ea08c7e4a6d91baf908793dad9435252f4d50633e1fa9dbff4440334df730c2b3af6744711f834f4226b71

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                      Filesize

                                      2B

                                      MD5

                                      99914b932bd37a50b983c5e7c90ae93b

                                      SHA1

                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                      SHA256

                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                      SHA512

                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                    • memory/2920-0-0x0000000074011000-0x0000000074012000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2920-4-0x0000000074010000-0x00000000745C0000-memory.dmp

                                      Filesize

                                      5.7MB

                                    • memory/2920-3-0x0000000074010000-0x00000000745C0000-memory.dmp

                                      Filesize

                                      5.7MB

                                    • memory/2920-2-0x0000000074010000-0x00000000745C0000-memory.dmp

                                      Filesize

                                      5.7MB

                                    • memory/2920-1-0x0000000074010000-0x00000000745C0000-memory.dmp

                                      Filesize

                                      5.7MB