Resubmissions

09-07-2024 02:17

240709-cqtpza1err 8

Analysis

  • max time kernel
    1049s
  • max time network
    975s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    09-07-2024 02:17

General

  • Target

    Trap-Stealer.rar

  • Size

    861KB

  • MD5

    3a846882eb3f3cdf812d66c6e65eaba6

  • SHA1

    e2ece70ff477c4728e49e7cdf6d274c517ec7f14

  • SHA256

    953592b85e8972a6496f4f6674b260829cda59c6876ca4a15d03d8440ecc62f6

  • SHA512

    63ed471b8ba7aa614d6ebdb00f06dccc68f8f367c9e9e385f8f1164bf893710f007bd574700ef886781334736548d93c50cf690fc3e250f0e8721fabab084323

  • SSDEEP

    12288:UxNkHbkbLAuhXj839phX8AufQhCgyJQUgpMTW8V2N9bfBfruqXqsTWfczUx4SP4E:GeY3AiXi9btumn9YWJ9r9qqTYHx4S1hB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Trap-Stealer.rar
    1⤵
    • Modifies registry class
    PID:4048
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2912
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8b480ab58,0x7ff8b480ab68,0x7ff8b480ab78
      2⤵
        PID:2080
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:2
        2⤵
          PID:640
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:8
          2⤵
            PID:4316
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:8
            2⤵
              PID:2072
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:1
              2⤵
                PID:3908
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:1
                2⤵
                  PID:3036
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:1
                  2⤵
                    PID:3944
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:8
                    2⤵
                      PID:3444
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4808 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:8
                      2⤵
                        PID:2396
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:8
                        2⤵
                          PID:1376
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2428 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3444
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:3548

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\73e4619a-3cdb-4337-8bf5-2d6239024c80.tmp
                          Filesize

                          285KB

                          MD5

                          235a1bd20d2b4f2cd7435edfa1351a22

                          SHA1

                          79ecf283d915cce165f01d0f2703a36c752ee944

                          SHA256

                          3221f94e6ca737402fedbc65c7f87d4734ee271810da1d0fffff90ee1ca110db

                          SHA512

                          d851d379bf31f83d6e1d3e226088eb57b35aba24112e43794683f3036f09a80e73d650fb2f90a82df86060fe9fd84db8c7864545e51adfc7782e955fb7eb042a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                          Filesize

                          1KB

                          MD5

                          4ae718c6cf0b4659504c8acd3520f519

                          SHA1

                          3ad16429a7d1ab9bcb1ef712c320c9b3daf0c3e4

                          SHA256

                          6f1a0af093af8e799e96ef284bb0d73621fc822c228d6cd4f8815b9f3d6dbc96

                          SHA512

                          199be20cf0960cbdc06d10eb065d42bc1a7cfb0eba55640fe8795ea9718117725be00272a1be6f9ea9fa2d5c8d09d20d3778277639b2628cd8d4667a52d904b9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                          Filesize

                          1KB

                          MD5

                          b4520d9b995a6e4064d314b2a89febaa

                          SHA1

                          4998ef077be1b5746a2b69d6548e8ff1da81e7a8

                          SHA256

                          251d7ee1cf668b01298e144f13c799fdd3c428f709ca56b0f7a21b68f060acb6

                          SHA512

                          0bd039ebc4a87cbb5d02088d9c0a8edbf81328162943bd50cdb0681334c03358c9b3b6493a92b45c0bec9563671f7ecfebfb7d8620ef9000629b9dae634220d5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                          Filesize

                          1KB

                          MD5

                          c9b8bd013e89bc5e98d038a1140863f6

                          SHA1

                          1ea877fb5d1795b4fc6e0fce9a936b6ab66d6dd5

                          SHA256

                          3703525822f04c697b6c36eb366b809b555650d6a184bfde9eb3425708c62c3f

                          SHA512

                          3349ef696ea23b1f8d5677543df84ba97668bc8dfc546a6737a84c779c412d1901704f2394be1ebe8c6c790e1ae96d878e3f108bc380780e500566d17f550968

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                          Filesize

                          356B

                          MD5

                          3137cd126e0eb5ee8c6318f2d4b6e555

                          SHA1

                          ea84cbf6548d3735901938670351d93c0c9565d1

                          SHA256

                          363ea939efa9229dfa3bba735520c630da08a8bc222e3c4ff1a6536e78650966

                          SHA512

                          c272ef1d171daf44064596671ecb2095deac7f8c3036ddcc6dbf39895ecd943cc30509f5714393f6ef06ed20caad60b5cf0371816731f1966e25bc81f54fe656

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                          Filesize

                          6KB

                          MD5

                          404dda78000c9df7fbc9c3f3ee3de24d

                          SHA1

                          b2cff1e6f1650bfbe5eb853295ddc2d641918c4e

                          SHA256

                          18283969604366ed5f5c270892f7ef55bcf877798f3a8796236181b5a4fc7422

                          SHA512

                          d01b88c98086c39f5f871ee5b9a3c16ac62c789c8f5387803062b378333c3177148adbc88bfe2bd3ec338806b132a018daedf2c75b9a9c7fb15784c4e6eda3aa

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b724f0f2-82a3-4d20-9d6b-310750647186.tmp
                          Filesize

                          16KB

                          MD5

                          4945de3c04036500e6a995fa963fd3c6

                          SHA1

                          7371d270e589bd7a58cf43660a9c88d4933b8c1a

                          SHA256

                          0209fc3d96ea11b448aeb5f1df492b4ef9e6a6aae46bfddd8d287fc01eaa035c

                          SHA512

                          0988a5fc78400c524f0c1bb93453722cd93eedef78cfbac7caad4fd1a2b1dd99fe5b4d0f6a6c9d67254ac3465011dc43a0d7fe09f2b28bb76620d730b1cd737b

                        • \??\pipe\crashpad_2776_CGHGMRHCGIUYPMSV
                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e