Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 16:51

General

  • Target

    de0f393bb2ba0f8da0300dcd6c7c0db03b915222eed80e287b00b4b0a3c85b58.exe

  • Size

    2.3MB

  • MD5

    8315efc4d16754a5d02938270f6ca01b

  • SHA1

    085eb12a0bc268a05e8dcc0b796991a475192767

  • SHA256

    de0f393bb2ba0f8da0300dcd6c7c0db03b915222eed80e287b00b4b0a3c85b58

  • SHA512

    14be79780f196ce086cce25f43ac93d049df551dd12c68ef19aef3a3bfd046385d09feae24dcdcd17176bcaa39aa5cea005242348a5718f88e4bf172e3156c51

  • SSDEEP

    49152:HBNwyQG51moKIMzj8cVUy++WptIDWnOvm8W0LM8dAL4FedduLGRp+513:XZz11MzQGL++Wp0vvm58gduC6513

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • AutoIT Executable 18 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de0f393bb2ba0f8da0300dcd6c7c0db03b915222eed80e287b00b4b0a3c85b58.exe
    "C:\Users\Admin\AppData\Local\Temp\de0f393bb2ba0f8da0300dcd6c7c0db03b915222eed80e287b00b4b0a3c85b58.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc51c6ab58,0x7ffc51c6ab68,0x7ffc51c6ab78
        3⤵
          PID:1840
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:2
          3⤵
            PID:2628
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
            3⤵
              PID:4004
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
              3⤵
                PID:2696
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:1
                3⤵
                  PID:4444
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:1
                  3⤵
                    PID:208
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4232 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:1
                    3⤵
                      PID:4116
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4488 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:1
                      3⤵
                        PID:3488
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4464 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
                        3⤵
                          PID:1496
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
                          3⤵
                          • Modifies registry class
                          PID:1592
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
                          3⤵
                            PID:1092
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4760 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
                            3⤵
                              PID:4508
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:8
                              3⤵
                                PID:3744
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2472 --field-trial-handle=1912,i,15172087118542879317,6833640327006667388,131072 /prefetch:2
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3764
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:3812

                            Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    336B

                                    MD5

                                    934a6d693bae27afe0656003bed5bfab

                                    SHA1

                                    6c7983e6b582234ca4c9503ef7820414f621e63a

                                    SHA256

                                    e440180f63dcb91b4669551a0bd0534acd01957e4cb831af09c42a348599a6c5

                                    SHA512

                                    3574211d5f83ce1b3eb48ea2185283178878e0b68c5b3353e81966762f65f45ded5cd62977d407484188e461c6f1856a76395bc3330d0c27302225d61552a73f

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    2KB

                                    MD5

                                    0e2b004f95df2eda7c3678acaaf852a3

                                    SHA1

                                    ccc0500c268dde1fdb176aeded5546e598b654aa

                                    SHA256

                                    7f1539f3c0ef1f89fe0864712c29e599b87d3dbcdc9e154175ef07de5bdd0ad3

                                    SHA512

                                    efe57e4f2cb177be064c1b862c220ab8b19d993c9ffa07d5c5b83f6c33c0196354fd89556abbe717f8875e8c49af3d6b9dd7b53197ea25911bd669123039c1e7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    2KB

                                    MD5

                                    e16e2a9c8ab259037cb0efbae102ac81

                                    SHA1

                                    4bf4f9b2a16d1032e0a727505e14a72eab78deca

                                    SHA256

                                    2ff5bba80ecd021bea9d0fb7fb8a5aa95257f16a9d086e757a87c0def1cb06e3

                                    SHA512

                                    72a547891bcfe566ba58a3b4bb859e6af6feafe4a0a519bfe648457edc2fc1302e70299e91961fca75de542fbad7316343537e35c74d075ce9391bbbbf7892dc

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    522B

                                    MD5

                                    61401853c8c8f599700aa0fdc4779d91

                                    SHA1

                                    4fc53592a98c9235b88fa14b5b44ab9f83b29de0

                                    SHA256

                                    a680eff6007927a0509ae68384d971683e53bdadae4add5b4048e9e0836e1ca9

                                    SHA512

                                    37996a6447fc9ac91383aced73bcad657264ec9347bc5633d84a1ba9da05f0214c15d448fc81902c4c97008f675aaa62cb741ce46b8e53d8d3fea509fcfff013

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    522B

                                    MD5

                                    83f6a89b9a997f37ff2eefba14472d3a

                                    SHA1

                                    189ea6352f2c6708484d701a0a7fb9ef97443fab

                                    SHA256

                                    d05b2f2c0e9c1cb4cd8af41049793144a89486be3b78ca7c3d445e1aa75fae5e

                                    SHA512

                                    2cafbcf3ef0924090b594e6979accfd90beaf42dfc2e280d783872eee85b6d1ea3586f48ebd28405360ebc07daf50d8465312794481d272284fd5ecf98ffec54

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    520B

                                    MD5

                                    0069c531b2eed027360027c3ccb64b67

                                    SHA1

                                    fccea7843c3cada7c774b14b4a02fccc4cd58489

                                    SHA256

                                    768aa9a57631386108ad7078f7b9ab2e4556e6515f87a60898be1c6854abb31b

                                    SHA512

                                    9aae70013933038a0953cb55a1e0c1c06e5f83eb1dd68ec9cdc657f588fa0f64c0070fd4b5e61e6c2e077a5cf30a06234ab19004e6510930c46233c619d8dba4

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    00e1db0c3ccb66b01f1fe3b1e43ebf2c

                                    SHA1

                                    334354892e7252bf81c58033a86a106a1eea783a

                                    SHA256

                                    33207f04d82f1a46a70a014c372d5fbf15dbc03356f1e8eb3f42f207814ecd1c

                                    SHA512

                                    607b6143b3b165c253f5d3649cf9b4890341e19d2837d0bffffe9c74cf29693a568cc2d1b23a701b674dadd5c3b5d8d3237224e78029c332b95273b6002d2f5a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    16KB

                                    MD5

                                    1a920633703801642b427f2eea236b5e

                                    SHA1

                                    ae583bccfbde6ccb43f930bbb3b1b8d76d0d84e8

                                    SHA256

                                    1e7a58a2a67d097308823d778c8fe7e65f20ff3ef88c4d7be3b81cd612094d50

                                    SHA512

                                    20233ffe171f126f603ef24265b2e071dfc4dab6a920db55f9d5a3ec104300669bebc2be74133cdc9c9e70578dd06862b7e4dd5501764d678602a48ac2d39464

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    278KB

                                    MD5

                                    e7033ef5f66fa9b8e43d4391b27a5175

                                    SHA1

                                    391ea37c166fb0f9ebd138f08e1bb8ca17896d06

                                    SHA256

                                    18f3ce33d4ff2f9fd12b12a4a92e5575d78d1991f130aacd650103194d7a8568

                                    SHA512

                                    5f4cc7089b109c3658b58e31a946f67fd3f29567a2983e540bfadce08213603d1a7a51071d4c0ecf126163867de4d8f25e870c0f417a53fcfbd4f8e41199d894

                                  • memory/2660-8-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-6-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-14-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-15-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-12-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-11-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-9-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-0-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-78-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-7-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-86-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-13-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-94-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-95-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-96-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-5-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-102-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-4-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-3-0x0000000000660000-0x0000000000BE1000-memory.dmp

                                    Filesize

                                    5.5MB

                                  • memory/2660-2-0x0000000000661000-0x00000000006C5000-memory.dmp

                                    Filesize

                                    400KB

                                  • memory/2660-1-0x0000000077DA4000-0x0000000077DA6000-memory.dmp

                                    Filesize

                                    8KB