Analysis

  • max time kernel
    299s
  • max time network
    293s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-07-2024 22:38

General

  • Target

    6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe

  • Size

    1.1MB

  • MD5

    619f9806ab2fad61f931922dd30ede7f

  • SHA1

    e37a5d0abee7f33f31001dfb6352f7282fae174a

  • SHA256

    6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac

  • SHA512

    3b6df4cd430ac31e10a4d957a995073bfe582fd3965d69a108d62d0d6429a26083e533fc954e734b1c1e16450ea258e86bec6923a24373ab842f231600ff6935

  • SSDEEP

    24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8au/2+b+HdiJUX:gTvC/MTQYxsWR7au/2+b+HoJU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe
    "C:\Users\Admin\AppData\Local\Temp\6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4200
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc85a89758,0x7ffc85a89768,0x7ffc85a89778
        3⤵
          PID:3148
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:2
          3⤵
            PID:4204
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:8
            3⤵
              PID:944
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:8
              3⤵
                PID:2764
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:1
                3⤵
                  PID:2740
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:1
                  3⤵
                    PID:316
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:1
                    3⤵
                      PID:3516
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:8
                      3⤵
                        PID:3172
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:8
                        3⤵
                          PID:2244
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:8
                          3⤵
                            PID:4984
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3264 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1620
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3588

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          216B

                          MD5

                          36a80d7b40af541ccb2bffda41b86b99

                          SHA1

                          1e096c47161c09252fb46c0528bd65f78c0773a0

                          SHA256

                          efe756782244faab0cce5254c3c4ea05025039ecb0ba3603e0f4854953e4211b

                          SHA512

                          953b815c9c74651f4dbce24c1d1e6b5d58df3d215d823012bb3ddaa6dc572c503b011ac164bc47e16710d6da4677d5bd0a1f4a610a421a512dbbb2f099ffb213

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          0972ee8d22e409656f3497fb3d4ef0d2

                          SHA1

                          34f033074b6797d64a0ef8a962aadb1042636d14

                          SHA256

                          371982bfef9bbbddaad8a6e0c25d6cda57d605d188cd0328ecdeda470025e181

                          SHA512

                          f6a0b98ec77879f6992c876222bbf073de2374c266c9993f596440f6e948df6a9eec739f6f9e04752686772a72950238c260a4fa5e0c51366750b3223282dd53

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          3ab3959836367f782b1971015eb7074b

                          SHA1

                          9725f10141fd6cfc3c7bd9e0f49fee9475da913c

                          SHA256

                          61fcd0d56025a2bc4b4b89adac6fe4f304a3b8194a603a5bd98fbbbbdba4c0e6

                          SHA512

                          3929deec7ba014084ae0f8b97ea281e37601ee82bfca5c9cd45d524cc6cfbf0c2e044715c16d4110ca2e2765af145b9b1d728565f655c9589f488eae37cd9bf3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          707B

                          MD5

                          445f250e618eabeb425b5038628260af

                          SHA1

                          012f5bf9ecf6abbd5b64ed2b1c5426c2b75f9c44

                          SHA256

                          f0a3bacd163b3f343718962b3b6ea21bd2d05858e732387873817b7f29d1325f

                          SHA512

                          d2d47b9d29c563cd07ad0f2acd18c5a75b0acf6ae0eba6235a46c8bb5bfc643d6e22ce07ee7483346fd25d07b589a899b699777ae177b8c7bd17a92e4cc65ef5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          d5c7ae6de7595f1be845a908dae92f4f

                          SHA1

                          e54495c41fcf264dab797caa7a97baf8be23d6e2

                          SHA256

                          8f194d14642719100b83b67e0d3baaca465b1adfce3b59f45fde67d143f96c10

                          SHA512

                          0b23c4622cb4c45941b5a7c1b4fd329786d801e26b2407f3cef55c24ec431b424f20fb88385a0ea2612a57031dbefdacefb0960ed77f977ca41ec8bd35ee5a7c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          ebe82d2ba24c49d415036a53cccf9d54

                          SHA1

                          45bb4ba9727130020dbab41262e578576341e9d6

                          SHA256

                          ce519af592bcf4d5025b1b4d8e76d0ad3505dcf49da46790f4b2843a720a9697

                          SHA512

                          27428d7460f16a2b39b86a5fedc206660c482bcfa3b32508e269ea8638c2c06e4d8badd5f63d73a02bbfc2bc2060678e954e84b75e0e46d9bb118f4d70714d7c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          d3e9ddb9de4111b1325e2b085b3e7e77

                          SHA1

                          80c1bfe76154a5095d56e8d872ba15a66daf5fd5

                          SHA256

                          2f2b91c34c78e1cd944d907d668d02d0e0d8b711a8c172ab3602b41cd49d790e

                          SHA512

                          1a29aea2a16d54e6ec6ae6ab2d313a8d3482cfc890d4ffbc0f5996656689e93f05266e4065d6e07a37ec19b55d4675c4889a7695bdb73a07d96c783f3b12b55b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          12KB

                          MD5

                          80393050284583653da0420fbcf3079e

                          SHA1

                          bf62d33ded94ccfbc5302e627f4b654bd9d786da

                          SHA256

                          cf5c5ee12a4546552f281d8ff318304be7939688fd7130ca1e40a578bf3e4984

                          SHA512

                          608cc8d94c2b30a0feb6fba1d25252a8f07062526948c5f687fddcff2b53628556388837403f517bdd0702602f73f5621416c73589faef3851fcf3a299033817

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          287KB

                          MD5

                          7b552a3ac363ea38f63f5486021ee37d

                          SHA1

                          f71c8073bbf73a13dfed2bed2187663aff6fb02c

                          SHA256

                          196c9fd486b8f53c2c21efb470658914862f373553b7814adb81179b8baa48b5

                          SHA512

                          a2e663626bfc325cbc1c30650303c76697a334e16397a062c67568b9dbbced41128898c762f92c98ccea971c8a80c2683fcf1153d72159722396eec0a306292f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd