Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 09:48

General

  • Target

    https://www.prizewings.com/bra/d8bde65a-3ded-4346-9518-670204e6e184/61be8f7c-1d87-4b12-8504-46c1b6c7b41f/58625c50-caa5-412d-9aa9-d5a734a96ba2/login?id=SUlvMURnb1o5VFZxK1ZuRTUwYXQyNG9iQ0VEUmhUQXNsSFZXZDl3NGhBSzZudU9iclJqSzZIVGVIUzZuSTZhUVlVa3pKRWVIWHJNM1c2QmljVnhWMDNhWkJCSUVHYXFkQ0dia1lBYlg4czZUOXFmZ1B5UVJVWm44YTZBRlhRQ0ZJamsvUVBrYXlORDBuUytHM1BEczZkSVM4QVUrTnJ6eFY3VVpoTVRXVkJjSlFYQUUyeXdONlBxT2t4TmRIZ1RZbDNmQld4QWc5R0QrY2lVVFZHRlI3eXhCaEl4cWNvdXRzSFpINitCaUpiL2hGOHFPVlNYNXQ1RXpiR2RBNG9PcUVSbVRpQktTTHJCMWVmM3hBeTR4V0hUSjRLaC95SEF5YVpyL1lLYTdkNEhaZ2RpYWd1VFV2V3VydXlVc2x3M29aeEluVkhlTE5VSHBqVCt4ZHJvYjU5MDljYnE4RVlsRjgwZ1E5Ry8yNllYOHNncE9KMndDVzBtTmF4U3I4bkhkQ1lDdUlJS0hmL3lFY0RxTkZqUEhucWRuNFpKQkxWei9tVnEyTVQwUzIxYz0

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.prizewings.com/bra/d8bde65a-3ded-4346-9518-670204e6e184/61be8f7c-1d87-4b12-8504-46c1b6c7b41f/58625c50-caa5-412d-9aa9-d5a734a96ba2/login?id=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
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbaa39758,0x7ffdbaa39768,0x7ffdbaa39778
      2⤵
        PID:4136
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:2
        2⤵
          PID:2060
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:8
          2⤵
            PID:3468
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:8
            2⤵
              PID:3784
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:1
              2⤵
                PID:208
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:1
                2⤵
                  PID:4064
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:8
                  2⤵
                    PID:1360
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:8
                    2⤵
                      PID:4308
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 --field-trial-handle=1884,i,12879168517203809108,587395456608166847,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4036
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:3608
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3640 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:2460

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Discovery

                      Query Registry

                      1
                      T1012

                      System Information Discovery

                      1
                      T1082

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                        Filesize

                        120B

                        MD5

                        87de4436ec03d8256fe348096bc9853f

                        SHA1

                        7619c886c5d8d459f0e1a7677ce4b5ab99200bd2

                        SHA256

                        9d5dc4efc6fecc7613787d170acc8545213d8f52ee6668fa8856d0b67acfc4c7

                        SHA512

                        5211fc12d064595149d5877fa440abe50983f710c944b241ef2745211244420f3daff542dda2aa7be40b23ec27372ef070b13894936f5eb422c893c589c98628

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                        Filesize

                        841B

                        MD5

                        a9c534c4aa3c34960befdd78f8122597

                        SHA1

                        a0dc65bd8f866402e1972d062e38a092adfc69b0

                        SHA256

                        e1fcae6cb5b7b1e6624eced7ef059b9401199297d07a6453da84aeb9b3ca47a4

                        SHA512

                        ec7cf29ffa9c22a1f246a84b39191eedf0724e4a475b80d9dba3b03c36aeadda530ede067d7e6593a0df4351e4a470061a53a53b70b7434cd486e390fc15c8bc

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                        Filesize

                        986B

                        MD5

                        067dffe2af3cea9911d6af72073b619c

                        SHA1

                        0acdc1a8721bdc33d5537df11ae245af94aab66d

                        SHA256

                        3accd105013fd09768d279d690ed35802c8985668e3b6fd558b02ad77979416b

                        SHA512

                        b0d07218c8514de576ea6222f62fa54f06ede985215a17c71faa3997afe5d3316ee90d87606b0f5e60f00f0a66e1fdac9ae4a9ced8211788915fb0ff6e7fb248

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                        Filesize

                        537B

                        MD5

                        24dd1bb7964dff4b7df3a0c2378f4cc2

                        SHA1

                        f5a3489c1ee51c6c4a2352ca96eb1c5b05abb395

                        SHA256

                        b37b580fedc10e8488e9a06c71e4bec6d006968594faa24dbf2dc7f4ebdea258

                        SHA512

                        df54494ee31ed4cf296c760496df18b62c14a4991690d02aa3e09afc566d641ee201d43ccb2349c384c4318584cb2a708cf02ff3eeb164368ad9a437ca23a8bc

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                        Filesize

                        6KB

                        MD5

                        e631dd2a55d7674bc891a93fe8e83243

                        SHA1

                        0a426920a29ead0cb3a2e1e27bfcd1c70ab3a4c6

                        SHA256

                        3fd4151223e8718f8f3f0d8305a6d37c24f2d1d493e10d38161714bed18f164e

                        SHA512

                        80a18a99e354452dc697035daee248be8c46c586291aa71b95a9d7c371c8ea6fffb48379f031023234cf921210ed5c9f770f4a73e3b02249992ca06ac613627c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                        Filesize

                        6KB

                        MD5

                        e839539fc295d6cd4861401e24bca1bf

                        SHA1

                        76abb2cfaf1a7aefd8362d0a91443a31234e7ece

                        SHA256

                        f9c639ad25492c7808369012521f44d4bbf3c06712dd7df2965b3ce75a599014

                        SHA512

                        b83d334ecaaf23478ae10ca4e308ec1b68b3ea02b789a84692ebe1856de0f053195bb8d51ba1cf022b953525a6ae5dd64448cd68a1637304a428ffe6441c6304

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                        Filesize

                        6KB

                        MD5

                        db7c5cf7cea73545ef05a5d1a22ea40d

                        SHA1

                        5fd6873db5f6a6f77a32bb09ec183455c2a6a0c1

                        SHA256

                        2cad4323aa54186bd4fc8bb47994f881b251f8d33bbdddddbd922be729ecccb2

                        SHA512

                        711b0fc81699eea8443310f7cfbf74b8fc24c19bda5f562f34b16ef91af063428b0f46af88e4220119412c0da0334cae9889e8a02c035fb71b99a29a193ba5c8

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                        Filesize

                        128KB

                        MD5

                        89a4a5f7288c350268bcdfb410c7e3ee

                        SHA1

                        0eaf0063f70459d05f1e340fecc9fcb5765b62ac

                        SHA256

                        705f7c2078337f0505f622f1ac854175e449b0d052a9fce3a12f098e3e2151c9

                        SHA512

                        b987213ad4f0a7d36949156212f9baf33a8a914c548180835309fc8ba3252a5c2674c7f31b465b7d1b138bc6e28deec841275d4cabf316d6de199c05bfc25eb6

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                      • \??\pipe\crashpad_4796_PXZXSHWLZJNMAXGG
                        MD5

                        d41d8cd98f00b204e9800998ecf8427e

                        SHA1

                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                        SHA256

                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                        SHA512

                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e