Analysis

  • max time kernel
    79s
  • max time network
    87s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-06-2024 00:41

General

  • Target

    AetherEye.rar

  • Size

    12.4MB

  • MD5

    b048ca976ec1dd16ae88a51e762792cd

  • SHA1

    33bb31a7abef7d964e8f4867960b90c44a2d91a2

  • SHA256

    3a873d9a989c5273d80ee4872cd297b67130f920a61ee29807dd83b78a695369

  • SHA512

    ae96d75f6f20804e53593e5832f9baba761ef16299cefb479e2f91f8499793328f7a1c1d826dcfa617b16d1cc94ac5a3469e8bf80f552a34071c06305ae0b069

  • SSDEEP

    393216:Rec8iTWWeY1buHkPt+y6AwIT5RSTwSudxajBLc:RZ/WWbuHGEy6Aw85SkajBw

Score
7/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AetherEye.rar
    1⤵
      PID:732
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1916
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd9efaab58,0x7ffd9efaab68,0x7ffd9efaab78
        2⤵
          PID:3396
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:2
          2⤵
            PID:3220
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:8
            2⤵
              PID:916
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:8
              2⤵
                PID:668
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:1
                2⤵
                  PID:3644
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:1
                  2⤵
                    PID:3808
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4264 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:1
                    2⤵
                      PID:2680
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4372 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:1
                      2⤵
                        PID:3636
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:8
                        2⤵
                          PID:2392
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:8
                          2⤵
                            PID:4128
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4344 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:1
                            2⤵
                              PID:4116
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3320 --field-trial-handle=1812,i,2839038538657010353,10730200700601784413,131072 /prefetch:1
                              2⤵
                                PID:4268
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:2020
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:4108
                                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                  "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                  1⤵
                                  • Modifies system executable filetype association
                                  • Registers COM server for autorun
                                  • Checks processor information in registry
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3028
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
                                  1⤵
                                    PID:3460

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    811B

                                    MD5

                                    01f294e39489279ae3c95248f8693c1f

                                    SHA1

                                    68e5f1bf6c25eb64e22987fffba82ca9ee3f2748

                                    SHA256

                                    dbe3e6bc1d97766d5104e38f7d8cf2c1f1d28237426b317afddc15d3034c77c1

                                    SHA512

                                    1886bae60318ab281d5630efa926b306b7ceebc39edb01c4fbeb1273f38522d8d55c2477c9ab6abeabcf05bd590d1243581d84fd3a1b3ea1220cc7dacf3ab555

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    023308d9eb5f9b20f0129f2b07554ed4

                                    SHA1

                                    31a4f9d822f99c406518088196bd803e4bb0a841

                                    SHA256

                                    64b0de5cc5765e9409fbe5804780959c3bbdbdcccf8ba87e34457ec85173f90d

                                    SHA512

                                    0b988813c1544424bdce9f2c273e76b50b5192cdb8c2d786e43d986f49b694024e9c63a145c91d97d451f60814f3372e8110c750a134e8bc2084fe4ed8e8876c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    77825ae1aa9a4db7dea193e1ee8af844

                                    SHA1

                                    3d95c338880b686c6e287bc8731c483260b3c58d

                                    SHA256

                                    9d070fc31027a3e4120d654736855615432c15dc55b3d21f34cf1a2c878a0004

                                    SHA512

                                    ac56b143d8ef3dfab6ecbfe2ae0ab4e813c50c1b82262bd0e4ed9c90987b0acfa8b5c4be528b2f1a908967c4c84354cf1777886e33e8864b7dd81a17f5d717b3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    129KB

                                    MD5

                                    55b2470c91c8a69df14e49d2d8ba4b14

                                    SHA1

                                    76fa544075275b5dc0847a5605ed39a7f3c0dac3

                                    SHA256

                                    54ee725065da654160da954504e9d3030b81ba44f19bf0bdc9cdf2b0072a93b0

                                    SHA512

                                    53796e6e840d0fa53fa88a60521012f35a34d8827c2483659cd782f7462c260b71965532068610112eea13fcca2ffa50794c12ea7ff204b13ffdf67604ddb3fa

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    129KB

                                    MD5

                                    44992ed53ef032d00a5f9522cc7725c7

                                    SHA1

                                    da9eb50c6059d25b9fcbc23a02e672f7a8a94553

                                    SHA256

                                    8366def3177c441b0354384f92756ea8ba82a0ad644cb2125a56f848dd2cdb45

                                    SHA512

                                    10998a43e91386222f77c8a5c0bf3c339ecd5356489cd09d2221d94eee6b82960bd15b7bb01ad8ca31d8810f9f182bb5ee21ba67f85d08e2291966d9d4feb730

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58