Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 15:05

General

  • Target

    http://7-zip.org/a/7z2407-x64.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://7-zip.org/a/7z2407-x64.exe
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9cafab58,0x7fff9cafab68,0x7fff9cafab78
      2⤵
        PID:3432
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:2
        2⤵
          PID:1208
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
          2⤵
            PID:2296
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
            2⤵
              PID:696
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:1
              2⤵
                PID:5080
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:1
                2⤵
                  PID:4032
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4672 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                  2⤵
                    PID:4812
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4712 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                    2⤵
                      PID:4048
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                      2⤵
                        PID:4388
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                        2⤵
                          PID:4796
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                          2⤵
                            PID:4944
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4832 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                            2⤵
                              PID:4312
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4124 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:8
                              2⤵
                                PID:4004
                              • C:\Users\Admin\Downloads\7z2407-x64.exe
                                "C:\Users\Admin\Downloads\7z2407-x64.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1488
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4260 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4892
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:3868

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      e1b45de586a8cc1a9c7852dc4bc4626e

                                      SHA1

                                      1424c37b6d2a0819981a3b39c78f71e6a089e4af

                                      SHA256

                                      5c8914993fb872f40019b01dda72d6e4e935a71d834678348e5c550fbb13f585

                                      SHA512

                                      0697e208352483d8903a2ac25709ea63735ae31478625dd0e092346a764cb1212fe74ca53507fac25f4e7f80d7b680870a847700dfb6b944b763a662b4ce9f58

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      7c3de475b4478b3225e607413266d5b9

                                      SHA1

                                      8ac33aaa991913c97fd653eb8d53a59741cc165d

                                      SHA256

                                      53055d5d703649254bb0f05e0992a8bedc7950fc89b76d5ed6d7c1b6abb3d533

                                      SHA512

                                      e01a1326f9340dab09b7be1f55a9c57e1d9687cb1aada514a5c6b050de3737282bdfa181585a01de5aa10f22083eff0e42b7b25cd8576af23575cb6709cda745

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      1d57a07f401abc54df14db9d5165ac56

                                      SHA1

                                      a08e378b3781ce50f922873d1a5b35e06704ccc7

                                      SHA256

                                      f6d7718683c000192327bb3eb2fbbd2deb25642ab4028002703f1e07112f0aa8

                                      SHA512

                                      a4a4839e678a3b8f42eafb5d49821123263b9eb423e2ce9e4f38b5b9be8d5bc32eb8d6d4d4bb998294d2510264c7563e5d538012a8cfc4f3161b2cb3a79e03fe

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      9327476b66b3636506f9acf08b05a44e

                                      SHA1

                                      dd7346102a9fe41ab4d574a749e68f84af18f4d4

                                      SHA256

                                      dd2ef0893960462314f637bd5f8de2e0f5ffb36491253b1586b821d814170681

                                      SHA512

                                      d826e8d6669b9ec9d89c60fef2ce034d6b094b492862ee4b820c97ed02545aa5265ccb622c4bd60561b442883471e6e945455e83a99886ec8c72e0115226457f

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      523B

                                      MD5

                                      5ec5d3ef9b9fcfd572779cdeb090bed0

                                      SHA1

                                      ac8a0e43e40cb70346925e0063010d59bb4ccc3b

                                      SHA256

                                      7e302b652dca21b5649f96e5271b85e992667822acd898bd8ec448a859ec4546

                                      SHA512

                                      7a9029522a41d9c97c2d2ee8c4a2d4e67cd1ba7f61377b8d1677b4bf51b0071403dc5c781fae5226d5248fa708087a88c15891746b8f5f5b5c146a5dcd85404e

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      7KB

                                      MD5

                                      9ef18283c58453e8665f9b3ade7c30bc

                                      SHA1

                                      93829c2dad43996f5276638a7b3f6eabd3c554a9

                                      SHA256

                                      4e290eee86aa35bdbee2241ba6a20c05e30403038aab51016cafc010de6266b8

                                      SHA512

                                      8b43dd07f9e31a3a0a87e46f3d4c26eb1430c6471cdb9294b1a2f3d0950253e4c53cc640cb4ddea4c04a2aad9c36fe265696d2d088bab71cf13b50b2c38c5fa6

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      129KB

                                      MD5

                                      f041fdec38789c9e4439a7faae00fa60

                                      SHA1

                                      db8eb4ebe16f56563c77fb066788ed186adaa7f8

                                      SHA256

                                      53a505ca350360500f2c5d3f4fdcc2bf0bdf67e9aa83b1c3e05ed805ae37593f

                                      SHA512

                                      8ad0b9a4db85a32c27ec369a70d883e1019a619e84c123498165d6c4ae4056ecc894c961aaef07dc3c2e12aea51e12bba570371355396ab770a8722eae98d3c5

                                    • C:\Users\Admin\Downloads\Unconfirmed 914837.crdownload

                                      Filesize

                                      1.5MB

                                      MD5

                                      f1320bd826092e99fcec85cc96a29791

                                      SHA1

                                      c0fa3b83cf9f9ec5e584fbca4a0afa9a9faa13ed

                                      SHA256

                                      ad12cec3a3957ff73a689e0d65a05b6328c80fd76336a1b1a6285335f8dab1ba

                                      SHA512

                                      c6ba7770de0302dd90b04393a47dd7d80a0de26fab0bc11e147bf356e3e54ec69ba78e3df05f4f8718ba08ccaefbd6ea0409857973af3b6b57d271762685823a