Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-06-2024 11:41
Behavioral task
behavioral1
Sample
MBSetup.exe
Resource
win11-20240508-en
General
-
Target
MBSetup.exe
-
Size
2.5MB
-
MD5
4e19e70399076ab58d1160d0fa2664ec
-
SHA1
e7ca7e0f1895c6bf60a14d6fbb0ccd4fb10a3134
-
SHA256
b9ee60f31be0b7dc3f814c8abbc7caacb6a3e1dc7eb1504b8e831dd42277f8d8
-
SHA512
f6338b52cb5a80d960e6b1ec72a28538614782a75d0270cb89e911160c0a0e8e3a4d0f93fb902c70c37cc5f4da0529043776e2c0b59287096f976addb7e584d8
-
SSDEEP
49152:6VCZ7CYG91YEzNIbd18dStQyfvE0Z3R0nxiIq2dd0ZyWmX4:eCZ7CXQEzNwABKtQRq2RX4
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\mbamtestfile.dat MBSetup.exe File created C:\Program Files\Malwarebytes\Anti-Malware\efc039ed-42c3-40b3-8b30-93c794e3b6fb MBSetup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625797790622822" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2052 MBSetup.exe 2052 MBSetup.exe 2076 chrome.exe 2076 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2052 MBSetup.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 460 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2060 2076 chrome.exe 83 PID 2076 wrote to memory of 2060 2076 chrome.exe 83 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 3120 2076 chrome.exe 84 PID 2076 wrote to memory of 4840 2076 chrome.exe 85 PID 2076 wrote to memory of 4840 2076 chrome.exe 85 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86 PID 2076 wrote to memory of 4560 2076 chrome.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\MBSetup.exe"C:\Users\Admin\AppData\Local\Temp\MBSetup.exe"1⤵
- Drops file in Drivers directory
- Checks BIOS information in registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2052
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:460
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff829d9ab58,0x7ff829d9ab68,0x7ff829d9ab782⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:22⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4192 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4124 --field-trial-handle=1772,i,9203323285541410576,15338663779529832932,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5558a1be6cfdebfa5efdd63f0ea5866ec
SHA1697f89a8193c17412c88610399fdf2dba6e1037d
SHA256420b298dcca323d97b326bef860647ebe20392ca2cf00a90a854ebabfa0d2304
SHA512e28e26c01a33bb6c7ec8fa516e8fca0c7d870cd6bb768e6305da7788f541c76e2dcdad0868ce51770afb60fd7763621e373bd1e6a36dbadcf7dffe6a9283f2dc
-
Filesize
129KB
MD5c424bace1d5df89a88e414098c52842b
SHA142eebfd2ec8abfc92033f46ceb85c3e36e007d1c
SHA256847fe5426b9bc9718362061016b03944de64defb9c49806f036f0d8934f94ac5
SHA51260675a6b21b2f4303b1193c85f04aa30255e0f013f5f29274b6f8a62a184a7955a4c39cc74678145f2239225c0592b216f17c8928a498323b25010cf81360f30
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5cd56e155edf53e5728c46b6c9eb9c413
SHA114b1b0f090803c9ee39797aed4af13dc7849566d
SHA25670a6cf268c013fb4d907bedc12af3e5f802f179f0cc8353c7b8227dde840d31a
SHA512a4ada455d44a89fd2baa505aa9266b70913967b839522ef5da8d7afd31af6662c3ad96ac3e3531d82a72be7d019c9d88f1ce391c5b5fa0e4422a634c51491165