Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 17:42

General

  • Target

    http://url7902.getaccept.com/wf/open?upn=u001.grDKE8qcs7FhKnVgrlBPOgCvId8hK-2F10DiAm-2FwbeAXopqemCd3THTun8mbuHtMcKSsrdCr2sZYFahL1ash44cUTRzQm4x3wpnKJajuoy-2BeGGNRgb2QxnnxYzAC1Scq08dHf1NzfNvtZXA9zrHS6mPnmqofBydNq1KfFWbU-2FF-2BDUs-2BXDAeYDlcE9NgL-2BLF9XRCaLbWKvNGvXyvD9SokwrGg-2BgBfkKwQw7UgRymropDDiJkCsWXB9NKv3KywL9lwYMX9VQMH3Cufq6KvdYVLjn6BwnEQoBjwLHzEpD3VBNhICV03JCnYw7mlnt2H4xzeSdb7y6fzHwemoGI8wUP2El9k31q4Ffye9wfU2u7AChh77wPGBgxcFoww38amHNoyol4sCjrU1AY32IRP0jA-2F5K4Z8dWTKIKDpKMFv2MeEpv5Uk8OqsFWc4jxQdajTbFbrb

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url7902.getaccept.com/wf/open?upn=u001.grDKE8qcs7FhKnVgrlBPOgCvId8hK-2F10DiAm-2FwbeAXopqemCd3THTun8mbuHtMcKSsrdCr2sZYFahL1ash44cUTRzQm4x3wpnKJajuoy-2BeGGNRgb2QxnnxYzAC1Scq08dHf1NzfNvtZXA9zrHS6mPnmqofBydNq1KfFWbU-2FF-2BDUs-2BXDAeYDlcE9NgL-2BLF9XRCaLbWKvNGvXyvD9SokwrGg-2BgBfkKwQw7UgRymropDDiJkCsWXB9NKv3KywL9lwYMX9VQMH3Cufq6KvdYVLjn6BwnEQoBjwLHzEpD3VBNhICV03JCnYw7mlnt2H4xzeSdb7y6fzHwemoGI8wUP2El9k31q4Ffye9wfU2u7AChh77wPGBgxcFoww38amHNoyol4sCjrU1AY32IRP0jA-2F5K4Z8dWTKIKDpKMFv2MeEpv5Uk8OqsFWc4jxQdajTbFbrb
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff98486cc40,0x7ff98486cc4c,0x7ff98486cc58
      2⤵
        PID:1704
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1992 /prefetch:2
        2⤵
          PID:1048
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2528 /prefetch:3
          2⤵
            PID:5096
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2136,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2632 /prefetch:8
            2⤵
              PID:2452
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3116 /prefetch:1
              2⤵
                PID:5108
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3264 /prefetch:1
                2⤵
                  PID:1864
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4256,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4600 /prefetch:8
                  2⤵
                    PID:4512
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1732,i,5641135471759499253,17395031103461961696,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4756 /prefetch:8
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1396
                • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                  1⤵
                    PID:4448
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                    1⤵
                      PID:1300

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                      Filesize

                      2B

                      MD5

                      d751713988987e9331980363e24189ce

                      SHA1

                      97d170e1550eee4afc0af065b78cda302a97674c

                      SHA256

                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                      SHA512

                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      9KB

                      MD5

                      66713d2b4ec8d9b1e1a3b8d10b6208a0

                      SHA1

                      3478bf1dde75bb6ad461d1de4e81933ef0802ce7

                      SHA256

                      c99d872fef5c68ed9f522e471f92da21770ad796310466aae57f6f8f530ecc58

                      SHA512

                      c6261642a3dc089168499b27a529a7ebff3edadd8e4d7c268602cb153fd9e57964223b6151b958ea9ba08bc431d82c305a9b733ef821a84a29ae98e94924ea6b

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      9KB

                      MD5

                      96709f5615c9435658b1657946cd0ced

                      SHA1

                      a21069c32ce2a4d791142b5153b69f6c385e47a2

                      SHA256

                      fe6ff0f48aafc5004034ea73ce5c15a816fd37cd33eedfb256789d5e2a922597

                      SHA512

                      146036889cf695167e344ddcda2502a475aef4e44cb4ec3efc00fb2dc788241db5b048d16ccae1f61e363f94dc82b9e72761f0203ec23d047002191c464f5429

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      9KB

                      MD5

                      77f38b930f0c86d1ed64bba0204e0152

                      SHA1

                      63797029b9aa6f2b9f03ea940bd90228fdd12c68

                      SHA256

                      5995e1a4b593619ec491aaed112bcdeb6d7167d32825f5ee3dd8abe47533200d

                      SHA512

                      dddce13052cbee608ef9cbc16983cf5cb2dd2a10391500eedf4d6f868201b38743c377f3b47bafda9551255a4511f0d40ee753d31c101d3b1c5e48aa438f16b7

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      8KB

                      MD5

                      a805c62f106db6c80a9ec0cd4556e1cf

                      SHA1

                      61f4f24ed86c7bd2f9aa45dbd360ee5274b14b0f

                      SHA256

                      2da9b864fd5ee2cfb2d88c03dfc6db3abf715899b78f09e9750899da69835ae6

                      SHA512

                      6cf5632c24699c77f721c04bb0b9704f7bf5784f8272d8471e621e6c027af2c55a9e706f45a465c7ba1996d564448ec9cad8ced91a8e76869cc5042f4f6132e5

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      8KB

                      MD5

                      9b1f410046290d84e9c173d89c1d4f35

                      SHA1

                      a525f0bf93de70d916a3d0de4fb2bccc1059daee

                      SHA256

                      645d16b00f2d038359d7013f23f83e31220adcc18a7535efd0fa465cfb475add

                      SHA512

                      27ae35caa8e5f25136c5c295b878b922b5258b63bbac5114d3ac0dddcd7b4a0f19913eb824cd1d373ee5ef22c7ba03d79f8e8a7ac6cacc764cb8785c7021c2f1

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      9KB

                      MD5

                      93682b3b93cd67d3f5eac5aaf3f1aa0e

                      SHA1

                      2a5e8a9cd9e83483c766c7094dbc119a99a18072

                      SHA256

                      8ec9d1ac6e2a169476b575676101c85cfb4f2754740efbd5903750a306ee6d10

                      SHA512

                      2356bca76bf8e19f14d50bbd0deecdd0eeaba2a2085fa47a255b0ea65993a8b5eb72a0e3e20110c922f839449058fb819c5f35491b9372e39632c942bb30a60f

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      9KB

                      MD5

                      56630e88d32e061551bb9d61313685d0

                      SHA1

                      cfcd16aa666b63389e0d24c833a13d7216c94e63

                      SHA256

                      fc17ee8026c126181fec93ef12e49f08e9dfce8c685b4b31d2723bac7c5fecee

                      SHA512

                      15dbec399d34b01bd5ad58e696091aa287b88573e8ffaaa49da9b7262531202baf790896f9880ca6ca818aaf0cbfaaeb8c5090db6462de6d88d1eadc52537491

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      9KB

                      MD5

                      ecc356c918df0cfe31e5243489bf1c23

                      SHA1

                      6065e458625c5d500bca52966bbe16bc68ff9689

                      SHA256

                      8100bf2a3108a0055756850d50740a429ab03473f3fcb663793dc9efa6311c06

                      SHA512

                      d42c80472ee505b56e1fd036c0749ccddaff1fcfa2b45703bed15acaaa8ea56d494b23d29a5cf1a8fe8255b1fbe3fdb97f59e72e291139be6c93ed2c4ae71389

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      92KB

                      MD5

                      fd2c4e8c195f094f1a2b280774fa6bbb

                      SHA1

                      ac41effeb63ce1a3f692c2fb191520d08ff8edb2

                      SHA256

                      9f19ffeb0b9bc1975e2e13c782781a0db4894543ccd0936684b1a18adfda853b

                      SHA512

                      c8803b30d3c98b6b192d93848ab6d56b4c76857afe6a2d2bb95de1993f7817ad9c21cdb9f9d48af0b6492c4eca69a72b0d8f849539319927c286c872adcb3eb0

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      92KB

                      MD5

                      41469558e12a440b9baf2d383aea5852

                      SHA1

                      e44471fcdab73a2141cb1e5f7a9c01c3f5a496f4

                      SHA256

                      d765b97f09cd080f65a2f39b1631ba70032bb66ca4bd5938787935888c333a89

                      SHA512

                      50d24ef4941bbff1b630439b6a26dccef683af85922c8bbafa06eb8d82de875a31ca756e63f6376d90bc01d763f91a48fa3cf7a4bb6997e3357c32d2d44f3c81