Analysis

  • max time kernel
    299s
  • max time network
    290s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03/07/2024, 13:22

General

  • Target

    https://solutionhub.cc/download/setupfile.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://solutionhub.cc/download/setupfile.exe
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8bf1bab58,0x7ff8bf1bab68,0x7ff8bf1bab78
      2⤵
        PID:1944
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:2
        2⤵
          PID:460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
          2⤵
            PID:3200
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
            2⤵
              PID:4580
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:1
              2⤵
                PID:3812
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:1
                2⤵
                  PID:1416
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                  2⤵
                    PID:4708
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4800 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                    2⤵
                      PID:2388
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4792 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                      2⤵
                        PID:4452
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                        2⤵
                          PID:4308
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                          2⤵
                          • NTFS ADS
                          PID:1684
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3952 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                          2⤵
                            PID:4612
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5108 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                            2⤵
                              PID:3348
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:8
                              2⤵
                                PID:428
                              • C:\Users\Admin\Downloads\setupfile.exe
                                "C:\Users\Admin\Downloads\setupfile.exe"
                                2⤵
                                • Executes dropped EXE
                                • NTFS ADS
                                PID:3492
                                • C:\ProgramData\43v0nm982y.exe
                                  "C:\ProgramData\43v0nm982y.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  PID:8
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 584
                                    4⤵
                                    • Program crash
                                    PID:2888
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 624
                                    4⤵
                                    • Program crash
                                    PID:1096
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1452 --field-trial-handle=1896,i,5882916642618821677,9397446119439481383,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3552
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:4856
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8 -ip 8
                                1⤵
                                  PID:788
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 8 -ip 8
                                  1⤵
                                    PID:1200

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                          Filesize

                                          1.2MB

                                          MD5

                                          7f5e4e4a6674f013990b5b9410a26855

                                          SHA1

                                          8983597a9299915f08f55aea414a452d703d14eb

                                          SHA256

                                          cb9633ccac2cf229a13719804e6b7912c76f5c7600884ce66a3de43d3ddf5f5e

                                          SHA512

                                          7b82a9619fb56bd4910d191e199b66309b69842ea28ce3374b61f07ff88515697053eef65dfee9b2810064c35854ce5cfdd0dfcbf8a83c27408952645b6e0aaf

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          02e1f5915216ee68274ebb47b6ed90f2

                                          SHA1

                                          d748715ecf656b38ccb200f97807e4370b35c746

                                          SHA256

                                          7ffc80ad2fa918e14645796e590645b993fed992e3676b407b21c5be5f620aae

                                          SHA512

                                          1e580eae6cad6ce20445da0eb511d4690b06009522c63f3823834159e2e58d5c807e494c4eb6a9c582a8e6f9ddf5d4b12f43f9ac8b272da3cce1b9f126d4971a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          844c92c565a3959e369e777716460947

                                          SHA1

                                          5aff56a6b3d4dd1766da85e5f626a2e8d5329b09

                                          SHA256

                                          e2d643c2bd42eeeaf6d015d54f4aefbcf8b0b01c3f86cbf9a1b8f539b7a6abd0

                                          SHA512

                                          890922a63fe5baec200e2100862dd4cb73703957bc1a7e3a85c7fdce4ac1c57a2f5e8f24fcc6fbafb1f806be06f5886c7555e382e7a3d9e761c274d94f233c99

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          543b0f1fba8471b020f92fadcb3dcabc

                                          SHA1

                                          b6251920fae949a654b53f435aae029753eca271

                                          SHA256

                                          9d8c0e5c5914c1158278dcd8cf2329e59af6f98ad93efebfc5717a02bd011c38

                                          SHA512

                                          fe43a8746684021878e873b7fd967d707fc85e235c56ba8af829ba383c8d8923bb6b925588301bc3e926b49ef090ef1e1b28ae6b46527d29e5898ba302e7cfe8

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          138KB

                                          MD5

                                          76380c9fc7280f5c3e6e04efca08c31e

                                          SHA1

                                          67fcc557a1780211c2ab913ddd918d2152aa3274

                                          SHA256

                                          7ea3f1856f0ee981e219087ff59be2e665f8c1740005bc2861ae9c928926f138

                                          SHA512

                                          24578da61f76ba5d2f5d1f14c31d2f111f5600cef211c970f26705803148c854cef970d180dd8378321f1d4f7f5bc59fef086e755d8b752fcac20dea9ed3608b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                          Filesize

                                          98KB

                                          MD5

                                          e68f92dc72725a45d413e4259a4f0cb6

                                          SHA1

                                          8c4a61a734c8ee1b3a91b1381747e86a20f86702

                                          SHA256

                                          07d86a4cd6350e80ea6bd47329360e6c586f75b7b7b5f263e6ca3d797f264276

                                          SHA512

                                          fd29f3ddaed0438b1afecfcaa6817976c127464bfae63ea1dabaad0d16fc036ee66184ec9377c988d52898708e378ef7f5a97102b1696f20f5a28ae4cf9bb16d

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57d745.TMP

                                          Filesize

                                          88KB

                                          MD5

                                          2132d5c21e53bdedd32aa3e8136630f5

                                          SHA1

                                          4702c862d85973c1136da6e84229463be8ca6c00

                                          SHA256

                                          11f6ce8af0fb72654c22602da1b49a7793e8c2e716f89a36392f17f1e6345718

                                          SHA512

                                          649fe4e0a14989bb5c1719a2e41f77911e8a92c77ad56bd2f05f68f3c611338995bbe9b23d9aa1e19379a126c575dcee65983049e100f4fbd42d3be57cc71020

                                        • C:\Users\Admin\Downloads\setupfile.exe:Zone.Identifier

                                          Filesize

                                          81B

                                          MD5

                                          4346965ca99498d10830a1be5d038983

                                          SHA1

                                          9c2244a0166ad58326ca16db5f3317922400141c

                                          SHA256

                                          bbd4560e5673d89471a5a82cabd71822afadf7de1db3d36c5644cdd2891ba59f

                                          SHA512

                                          3d1c8acdefa8d77bc36d0fd2c7e5cbe780a09f738152d1af6d0ccecbac76d3e2d0e74408937e045e1ea63572c342580aa2da3cda068c9e7df5a7bc77951e7940

                                        • memory/8-116-0x00000000011C0000-0x00000000012A7000-memory.dmp

                                          Filesize

                                          924KB