Analysis

  • max time kernel
    71s
  • max time network
    78s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/06/2024, 10:40

General

  • Target

    http://AhV3cTpms4e.softwarepatches.support/3/76708532-ac39-4f18-a476-b0b913a60663.png

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://AhV3cTpms4e.softwarepatches.support/3/76708532-ac39-4f18-a476-b0b913a60663.png
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa0b0a9758,0x7ffa0b0a9768,0x7ffa0b0a9778
      2⤵
        PID:4268
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:2
        2⤵
          PID:4856
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
          2⤵
            PID:4300
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
            2⤵
              PID:236
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2704 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:1
              2⤵
                PID:4732
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2732 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:1
                2⤵
                  PID:728
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
                  2⤵
                    PID:2268
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
                    2⤵
                      PID:4764
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
                      2⤵
                        PID:1880
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
                        2⤵
                          PID:2680
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
                          2⤵
                            PID:4332
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3752 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:8
                            2⤵
                              PID:4736
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:2812
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:4408
                              • \??\c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
                                1⤵
                                  PID:824
                                  • C:\Windows\system32\dashost.exe
                                    dashost.exe {ff72b258-83c8-420d-854b4d3698edd36d}
                                    2⤵
                                      PID:3416
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5108
                                    • C:\Windows\system32\mspaint.exe
                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\76708532-ac39-4f18-a476-b0b913a60663.png"
                                      2⤵
                                      • Drops file in Windows directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3716

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    1e138da4fd3356c12df8869ac387a765

                                    SHA1

                                    8b12b1b05947a8a9783c9d6727e9e75a1aa46942

                                    SHA256

                                    f49dbb5b400e4f56173816d605dde2d09e307346836c9dd79af3b5f1968d50f8

                                    SHA512

                                    ecf87060920994706ccff7e19f0cdcc3805336ef66daa76ec0431dde86505c88636ae7c113207fd6cc403cbbcd07f92a019b0c9721c327cc6db46288ba418db5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\afd3459f-0cfd-4924-8896-626629fc3eb3.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    a9172ad38bfef4c48d3694bdada84495

                                    SHA1

                                    010f6821d6d10b7601c631a114cd3d25e27abb6c

                                    SHA256

                                    93e31946e9268b85e7864ac6c3f616e7856e6f61ab0b04fe51e6f9a2d3b8e1a7

                                    SHA512

                                    a53e3160518b77edc3a77ed2616d820e1b5c14ebf2a9eefc7bbfdd6412e97e92150f5daf82852fd62621cedd98c85f7512510d679f4c5b0f5d1826660474a0e1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    150KB

                                    MD5

                                    ef9ab2cd5bfc6f71d2790c7c26da8368

                                    SHA1

                                    ada1f6960c296bef7c8a852c6ac0a2b9c8a88891

                                    SHA256

                                    2e5f4fa1fecb543ceac8233873be8956d360be7f98f0c0d6b4df7e469aca2249

                                    SHA512

                                    79bd432e9655a628ff33b1074e39bde502b16cc683b552f59e5aea11236360cce53ff88b340639ed691193aae922d69726f9bbfec723a0d7d98816151e051cd3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    150KB

                                    MD5

                                    95aed71ebd725ef441a7ded6353e1532

                                    SHA1

                                    972e8269fe96ceb3657128cb771d01577f506aa9

                                    SHA256

                                    35cd4ea249bc404a77dc6574d318b38e4ec1d5959f7d66e515ba6d288a97b9e6

                                    SHA512

                                    12ca17f4d7604947d704a8b5f5a5f7b7111908302c85d885c4b40589c865c0ff560c5c98cf5d06cf50a1440c833afa44324d4ce41b9d386211ffbd1216cb4db8

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                    Filesize

                                    2B

                                    MD5

                                    99914b932bd37a50b983c5e7c90ae93b

                                    SHA1

                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                    SHA256

                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                    SHA512

                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                  • C:\Users\Admin\Downloads\76708532-ac39-4f18-a476-b0b913a60663.png

                                    Filesize

                                    68B

                                    MD5

                                    4cb1af037c42e0c2261d44f0628e6945

                                    SHA1

                                    0da4dfd0e66d2730bcacfe06f94579eef2483bd7

                                    SHA256

                                    4e754b6398ee1dbd5e404322f751c6cab7e531ee0a4056a146a08afa1c80fece

                                    SHA512

                                    089f5ed58235ef47e37747b803ba1364bb4f24164e727e77f42e3deb0ec699fec94f659b6e22de1fd472074dc48089b241d95643b973ea9a4a1296a3c76b08be