Resubmissions
25/06/2024, 19:22
240625-x3d59szhqm 125/06/2024, 19:21
240625-x258cszhpk 119/06/2024, 20:55
240619-zqt23awapq 6Analysis
-
max time kernel
77s -
max time network
78s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/06/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
midnight.exe
Resource
win11-20240508-en
General
-
Target
midnight.exe
-
Size
18.8MB
-
MD5
fc550461fe770b0de1846f381e424f3e
-
SHA1
b32198072ae328ec1a44ca521c0775d7a6e870b8
-
SHA256
7d69b0d2d4faa7ffd46cc908ca441e69814c82e10b95590f60a05853d657aaf0
-
SHA512
6e53c445b6c4135652f6b649c20f464bcd70c5f131061779661e432ec1b2d8c53023d3796f08fbd21798ea2eaaf4da682173d35559d513c6eb022601c9234c47
-
SSDEEP
393216:ieOMFdSGA5YMeU0hsRGUCTRADYT0RBCofgMDyYCKZ9oWKa6wt3b6nXvN:ieOiSGAGfU0hsRGU2AUgCofgMDyYCK58
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1472 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3192 4384 chrome.exe 80 PID 4384 wrote to memory of 3192 4384 chrome.exe 80 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5096 4384 chrome.exe 81 PID 4384 wrote to memory of 5092 4384 chrome.exe 82 PID 4384 wrote to memory of 5092 4384 chrome.exe 82 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83 PID 4384 wrote to memory of 4308 4384 chrome.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\midnight.exe"C:\Users\Admin\AppData\Local\Temp\midnight.exe"1⤵PID:4712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd056bab58,0x7ffd056bab68,0x7ffd056bab782⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:22⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3792 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4324 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4452 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3984 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:12⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4356 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3340 --field-trial-handle=1732,i,6790081246709451788,17068481823270097738,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4064
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1472
-
C:\Users\Admin\AppData\Local\Temp\midnight.exe"C:\Users\Admin\AppData\Local\Temp\midnight.exe"1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD57f5a5d45ee4ea0bd1ccf5178c63f43c0
SHA171cafbec33de805f8c65c04ab40a7fc072420df1
SHA256e47f30921e1d3fda22de0ed56c9847b80e379396ea95d3fe60e04cf9e4c9773a
SHA51211dcabf8a16fd008783be04cf72e9ebcdc3b37a9a92c0769daa32fcec0a7ac5f1380d5e7636dca14eee05e5787419d2f5782726c94846c39085b325099c123d5
-
Filesize
528B
MD5a8212c6c431a1e18e73cf42b917d4f55
SHA1374a1edc517df088f81b7d3e3e439dbad52a2b4a
SHA256a4b5ca3b721b7e8f86bffe4157d23a57c99969721350169b74e5ae0d01353126
SHA512eace0c186d688c4cdefa08d71c0027c7478fac70a3aa7b0ea52058d983cb5cbc3a88b7a0a8e2dc6ae1808fd9e3758d0c94967398f9f6d4ec46f7990e389f37b0
-
Filesize
3KB
MD59da89cc2750e6df2228542aa93133598
SHA1bdff556876034ed2157e43df1c171aa3d692ccaa
SHA256fb013d318605d248a0634550f6f7be623c020dc2c2e6cdde9dfa5ab18a5d4d6c
SHA512ace816704084776ed0994944cbdfef8fb8df615d6c56038e91a30a48c2758328fa0030ba101dda09d6c22c15adc57455cb8c8341db0cbd6b3be05e21f2827787
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5cc161e1bb9bf12fe745a822289a39ad9
SHA1b09b0c1a5f8642ce43cc5deac73932dd4707804e
SHA25664d151e11ec00a793380209afc9db18c1d6c05b5a1fc7c4901f197aba07b9b77
SHA51289fa548bda1a416b9e3d4aeaf1e72dfaf1c75478c7b0342bef3495f821e87f8a0b26c19d50375fca6230c8ec5872d7c9f640c5d8789ecbc9a8cea51b88fc1952
-
Filesize
6KB
MD56d62ff75be19322c1cf850bcd09fedd6
SHA12e8541890706f99aa12ca63c7a3db69ee0549194
SHA2567345d5fed0beff50c7bac0d61d73bc4eee6387d45fa62c2eb737e95d072b29a1
SHA512b663e548fe8eb666675867e4c7ed7ffa295e706e08885ca16a1d90b9ea30a1cc7a000011772e9601cbf3b3a10f8d491f73c8dd443da4ff6ca2cfef1be6cccb39
-
Filesize
130KB
MD55dc1d9a5e29396b6fdb98dbb235d26ff
SHA138fdfa5681e62ba0afdbf65f2dac2fabd5e42ca4
SHA2563e3f69072e8c130c320d0bc9a9762704a0b758cadec175bb3b5f77dac007062f
SHA5121144d572160c3456ea04f1074096f43f7b18b88631cda75283da2e448ef858496863107f1fda249d13ef928df651c909eb050476076acb40ec5f637ea4fd3148
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5cf4d76f1a9247b679411a23597ab0736
SHA1ca7ea2bb3f8f7be7c59eb122cad5b045cf4e9c66
SHA256552fdfebf5efd5e7e3373b9030d26042a53a28197c2955a8dfa3eed3479c6bbe
SHA512a21e03a0fb43eb2f50e2ee98e9eee1ffcda02f5e418352d567904c4ff33ca536c938f0cc46aa258bc6df37d34f05799bfc8c7d99a34afba789a2286ec1c47a91