Analysis

  • max time kernel
    629s
  • max time network
    599s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 19:12

General

  • Target

    cracked.exe

  • Size

    1.6MB

  • MD5

    12e5dbc1d6a4370ee989d4b79e6ad7a2

  • SHA1

    db23d67cec455239f7c4680337238035919570ff

  • SHA256

    5b3ed1c25164331c2add8376d0430e1bd96a4a575c7e98bc25d6a27669d7f729

  • SHA512

    8c8cd26343e90c10f304e07cf7c3fa12f34d3575e7376812e94caa21e871e2e96b7f4e7100e30a89a9cc854f57e9405d4db115198d7cb9016ee0ba6f1e4d6f6c

  • SSDEEP

    24576:qlXccien13tMnkMqkRkDI33N7u3Pw681nlClekUPbj7Fg:qlyenltMkv03d36inQU

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\cracked.exe"
    1⤵
      PID:2804
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3688
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4220,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4084 /prefetch:8
      1⤵
        PID:2640
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb3ff7ab58,0x7ffb3ff7ab68,0x7ffb3ff7ab78
          2⤵
            PID:4636
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:2
            2⤵
              PID:4964
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
              2⤵
                PID:4512
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
                2⤵
                  PID:3252
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:1
                  2⤵
                    PID:3160
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:1
                    2⤵
                      PID:3760
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:1
                      2⤵
                        PID:1056
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
                        2⤵
                          PID:2352
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
                          2⤵
                            PID:2368
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
                            2⤵
                              PID:2368
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4612 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
                              2⤵
                                PID:5172
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1860,i,3522508987949162682,3568068968237771783,131072 /prefetch:8
                                2⤵
                                  PID:5220
                              • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                1⤵
                                  PID:4932
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1280,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=1372 /prefetch:8
                                  1⤵
                                    PID:5432

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    33e99b3347662edb1743f766704a7fab

                                    SHA1

                                    e26e39fb70f42fbffb41d0d28027defd7fa9e3b0

                                    SHA256

                                    6ae8a8e2c7beda2d13e612cb52ea1830972482011eb8db8264cbff1f2f8cbf02

                                    SHA512

                                    35e0c5a8fc8b390ec2a804654175d72ff12af1cd3aa4ce3c528b3eaefb45be7d077b3147a0dd7afc30d08be83121003b0c8bac5b5c4e0d418c7b40e497eb57d9

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    b1a176c5433c502a189205d0a65b0d54

                                    SHA1

                                    4d6d83db8958740bf1904f3c821f38aefa0c3e58

                                    SHA256

                                    41de2b51a501830a27c89eee9605e4a7a098d0dd49dc1f624c5fb735d91b74b7

                                    SHA512

                                    3a3dbfe0075b57ea6a3fc438c2cc0661a973185fdb0d85cd79a8f96d537ef07821620963c91750168648a8abeb8f3f56348df2f90967c3ef691b95e1a9673210

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    a2ccaaa9f0de7055f9a3a2838d7fd866

                                    SHA1

                                    f0c1289189c8b109b1d858001f6963707d89ecd1

                                    SHA256

                                    39827f6b4d218566ce3b2077a3e2d577b8719d802cf21f2a47b573106d7d8c53

                                    SHA512

                                    80c94a75b352126ab5eef9dd72ba8ae76760e59d9e6b8e31aa6f438cabf4cc710b270c317dbb2e7d11d99c4156cfcfc70c6a83c8b82375422576252291e69799

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    a1260d01e81259694a4df8b7d15e0fc0

                                    SHA1

                                    91387d6388074e11a099c11984314d9ad6a2b46e

                                    SHA256

                                    c424e33857be1ca353bf5209f0449c2e9043b97c8028feacd53ab3ac380070dc

                                    SHA512

                                    bbef51527f036e6483afff7b72d93c41e0f1481b64457cae2ba49001659ca60c190b8fc82b0f4b1778243a1583e2885a0454d2a2a20f69a1259a156ffa353a33

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    16KB

                                    MD5

                                    2cc045d72ca2c641f6076486ab8f50a0

                                    SHA1

                                    914af5c57cf22f7c2faeb372dd784fb86bb38e2d

                                    SHA256

                                    f44611c84d924ca24e57e548cd978dfb451f67bcd05ddfa4abf7b2c98216ab7e

                                    SHA512

                                    f568cec1b226c4bbdd5497b22e1530d8838c0691d21c7c0c8366a5562b26a99dcedb17b46846ac961e3bed0dd8f564c07851e3683d8566b007e08deea01f82c7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    263KB

                                    MD5

                                    a03b1d4d7a2869724a9caa8bd18adf4a

                                    SHA1

                                    816b2efe2f3c551147ef06ab230e3f0e1b434e57

                                    SHA256

                                    0cae57f2c3fee26a852bbef97368ae2fda573742787067a955923125cadac610

                                    SHA512

                                    a54fa4dd1764340a65244bab96cdc60f3304aeac7b9ed850f1c0d7f88c64496e7b7a6b2c648b76009a08ba49164e1f998f6a130e14f078ae502d114b19d5b31f

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    263KB

                                    MD5

                                    3fb3645a9c0a2ddae049cda24108d3e2

                                    SHA1

                                    5e4c39be0651add83477b6fee9aa67544c725f6c

                                    SHA256

                                    463acbba3cf23131aee34b16b48b283115d34841a30dae29b15932653a000e61

                                    SHA512

                                    48db0e62b68fff2307ecd7f8d697eab9812ef6d2a153d2444892e0a82dd4deebf807e5d8b6ceca42b4a38f3c3885a901b032f348b6918d917124a0f661fa7b8a

                                  • memory/3688-2-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-6-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-7-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-8-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-9-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-10-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-11-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-12-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-0-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3688-1-0x000001FC4F520000-0x000001FC4F521000-memory.dmp

                                    Filesize

                                    4KB