Analysis

  • max time kernel
    36s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 17:41

General

  • Target

    empyrean-main/install_python.bat

  • Size

    686B

  • MD5

    f30718a354e7cc104ea553ce5ae2d486

  • SHA1

    3876134e6b92da57a49d868013ed35b5d946f8fd

  • SHA256

    94008c8135d149fecd29ca62aded487f0fbfa6af893596ffc3e4b621a0fe4966

  • SHA512

    601b2256ea709a885741f1dec5c97dda6fb7fd4e485b4afac3503af1aefe73472e5bc5529c144814a3defbc0b51ac4b50e02a50dccc69b41ee5d87a3f4282874

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\empyrean-main\install_python.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:116
    • C:\Windows\system32\curl.exe
      curl -L -o python-installer.exe https://www.python.org/ftp/python/+FullyQualifiedErrorId/python-+FullyQualifiedErrorId-amd64.exe
      2⤵
        PID:4596
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa44d2ab58,0x7ffa44d2ab68,0x7ffa44d2ab78
        2⤵
          PID:4468
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:2
          2⤵
            PID:2216
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
            2⤵
              PID:3196
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2292 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
              2⤵
                PID:1724
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                2⤵
                  PID:2176
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                  2⤵
                    PID:516
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3600 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                    2⤵
                      PID:4196
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
                      2⤵
                        PID:212
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
                        2⤵
                          PID:2892
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4144 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                          2⤵
                            PID:3992
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4456 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                            2⤵
                              PID:2168
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3260 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                              2⤵
                                PID:2676
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4680 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                                2⤵
                                  PID:2796
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3088 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                                  2⤵
                                    PID:4588
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5020 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:1
                                    2⤵
                                      PID:932
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3944 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
                                      2⤵
                                        PID:4920
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
                                        2⤵
                                          PID:1592
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1868,i,6521349650449668370,10307484834341263467,131072 /prefetch:8
                                          2⤵
                                            PID:1464
                                        • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                          1⤵
                                            PID:3372

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            7KB

                                            MD5

                                            52fc03b6a94c7941251ef1b2a7ad8dd6

                                            SHA1

                                            1715fff3800887e16bf8bb2204c88e27e7373b39

                                            SHA256

                                            27d0d0bb8d1c3c7305becdeb66ee8651a997ea89c6cffd7607b6e3546862bc6a

                                            SHA512

                                            c0220b0fea2b68ca094af637a717c437b07c9a539c3e3bc5f02b5fda8b37a44a0adf811562b3cbea32d3705a90650d4cf98324de7142b5002d48da35c28f36d4

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            7KB

                                            MD5

                                            7a11c9c3201a8237b204109c3a1505a2

                                            SHA1

                                            4ad1c79372add8c389080bb0c14282b180f3d69d

                                            SHA256

                                            6a3a4b9246373d17c7c74f82033286cc346498542db3cd39e4c5f32718e5e05a

                                            SHA512

                                            7adf8efc248edc63eefd9f1b9776658ef9bacfb803ee35bd71fa4b4bbff269dcf9390505dad477618375b00f96af3462f57a310cc68872e9202cc25bce4cc5d1

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            257KB

                                            MD5

                                            6645755fa4c50d10e82c56cdd9f93d02

                                            SHA1

                                            ab1126cb5ea54e6d017defd38aff003048d762c1

                                            SHA256

                                            84f1248c96cbd1e4328170108c08b621c07ea2657445095e9862c3e5a4e3eab2

                                            SHA512

                                            b01f9b0c00610b47b69cb5859f658df9fa0d01ce615ee69e25149aa6307c94af4f738f5b3977275b5c4f50e11dd5000c7228cb9b4ea585a4c93e13fa553be52a

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            257KB

                                            MD5

                                            1665eb3903709e679a47ea57fefddf8b

                                            SHA1

                                            034c34166adb99d6f83618ea8fc8a2619947b7f3

                                            SHA256

                                            82355e5d455a002038217ddd44fc443ceca6cd30c717339ad612f446e645da52

                                            SHA512

                                            8c34c781d12ff092cbdc068b1dea99f2a8b0d6000953401141ca0b89aa24e086280bf2a79d32597629d4acaf80c45df82fa73133163efeabf4724ca6a6cbc0e0

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            257KB

                                            MD5

                                            8e8df02fa44f36afc3e822a51b5deeb0

                                            SHA1

                                            68eb08a1068f1f24c7c344f7139eebbab2394313

                                            SHA256

                                            5b71fbeff096052652a9160a79112637bdae8cf5f73ef98f7aa199a11ec05501

                                            SHA512

                                            cc55be498487b2f8ab6f180248cc2d75f3e82a5f78210debd0f72d234a512814b292d081533976b3ce3690fac798e96e3c60f9768428ac43e031c6c2a11ac737

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rjttz1ps.ys2.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • memory/116-6-0x000001BC64600000-0x000001BC64622000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/116-48-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/116-47-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/116-12-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/116-0-0x00007FFA4C3A3000-0x00007FFA4C3A5000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/116-11-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

                                            Filesize

                                            10.8MB