Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 19:00

General

  • Target

    Shiba_gold.dll.exe

  • Size

    16.4MB

  • MD5

    3bb74bf82219af03a21f765c2aaf28af

  • SHA1

    002069c1af985b702a70ad1f4d54a773af840934

  • SHA256

    ae218f769ad0a9212c041fd9b70a7ee2bd7ee1885257f2ca075c76fccb068290

  • SHA512

    2dcdc5b97b8ad4089d1f550266ac059be7c42ab05d06f2bdad44ac6f46dea32dd42da0344a6007fecf954720995980017a0e7502727b12e965dbe57767c212a0

  • SSDEEP

    393216:vVwYEkwAc1KudL01+l+uq+Vvz1+TtIiFo0VBxwHZ6bj9iU:vVwYI7R01+l+uqgvz1QtIm2ZU9b

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shiba_gold.dll.exe
    "C:\Users\Admin\AppData\Local\Temp\Shiba_gold.dll.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\Shiba_gold.dll.exe
      "C:\Users\Admin\AppData\Local\Temp\Shiba_gold.dll.exe"
      2⤵
      • Loads dropped DLL
      PID:872
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:264
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7089758,0x7fef7089768,0x7fef7089778
        2⤵
          PID:1192
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:2
          2⤵
            PID:604
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:8
            2⤵
              PID:2904
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:8
              2⤵
                PID:1524
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:1
                2⤵
                  PID:1604
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:1
                  2⤵
                    PID:816
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1492 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:2
                    2⤵
                      PID:2692
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1476 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:1
                      2⤵
                        PID:3004
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 --field-trial-handle=1376,i,6545549459849191675,17656807117076468903,131072 /prefetch:8
                        2⤵
                          PID:756
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:2300
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe"
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2712
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2792

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          a6066d4b9a545f4974dd1bea706f71e5

                          SHA1

                          739369176a758b5325b5bda777ad919bba8bc183

                          SHA256

                          fa838b6fd9916aa9a61120213a71b8da5c44d81ad379f0711632644587192d01

                          SHA512

                          a07622f70c545e498f90c781ef5fc14baf4c0095b3c2b6fa039df113ce3d1fa20f697192e4363b614560316dc9b219bff26cd66c533be2432611686af1df9193

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          1c68b24d9e1c2ce46782b73fa5dda2e8

                          SHA1

                          393e065069900bc5eb42a4292b58863ab2dfb7b3

                          SHA256

                          8a59622f6877078ad141335f630865ca896b6289581184b840736cda387af7cb

                          SHA512

                          fdbf795e6e2faf34062e741d2cfaa5db73e9037411dff184b2c8fc6c6e32a1142560cb2d11510fbfd40b8eb4a0e804f6fffa9180ad6c36a6ade28eda705bd457

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          709aec38577b51e3b2ab7f4284b1dc1e

                          SHA1

                          34cbd6ce0bf7d7f9e2c06e089c723dec414e936c

                          SHA256

                          8126f2d321a281af53e53272fa3c76fa5f5011ed9fbf088a0cfbfdbf85d17ff5

                          SHA512

                          266ad4f65923493f7b1ffbbfd05ef3fb823884be695084f503506b8126dcfcd578dd30f7d4ecee73600bf808a6bf6d6419ddd8cfb7bd6d7b04779c0a6df5f7b0

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          38ed541907e822260071154f4b1cb054

                          SHA1

                          fc088e201420ea85c76a1a9c31b9ae06c836d9d3

                          SHA256

                          bdeadc552e8fe867878c9d5cc5274582e9fcb878fbb79f9df2eddd1ad307010f

                          SHA512

                          67e30fc948cbdcbe4b37ce3030e6f7360fe432e3703f371a08c255e56d0a7c18e4286ff30e1bb60b40b3f8a1a38fb85dd0bb636fc1fc72b8e4dd40cf091714b5

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          57237df81ec9c024e5e42f079faf5649

                          SHA1

                          29d46b18113b85a43a7529e2ed497cd3098890cf

                          SHA256

                          23c45fa012b92ea8aeee4b969879534090f322f79361e5ad2a0435de8b5f6ced

                          SHA512

                          057de8811e910ea9ebf38cc970c6f9138760388a22d6229fdd65e1d8a6afe6462e9b616c9f00306cf8ed46e882173762119fd01264a1ce1c9119d1a5723ff42d

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          0a1b2f0686be43c4d667064407ddbc1c

                          SHA1

                          47bf11e7137af9c530cbcf8ab3dc6183067838ee

                          SHA256

                          79260a8f072115eab9d56bf02a9bb0cce6cd2eac9cce4619227ea337c5aeedf0

                          SHA512

                          96d86e13ed7ae8714b9b083bec7f6234bb53dd8fe6645b80fe3c215040af94d7b77e80a83d46c0539424d9cf540401c5a7c8d46c7652dab3b37b7ed9b51a2e9b

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          e0d33b90bb60a7bfcad63fd069fe15e0

                          SHA1

                          35d90b0fe0c11ef5fa047238e6d11ceb74bd9a82

                          SHA256

                          a9996683a77138fc031e66d7a88010877455e8b6ddf46d50252e7af8b8a7c72f

                          SHA512

                          feb9a052a21a8d504e3aa4fc274668c48b1871e684b4fedda367097a225dbbc2c29155693229e74fd0739e3955ce4e7d893bba62d2fd6ea36e048c3e1c23349d

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          cef244a47e0ba0e1611191c4fd094ec6

                          SHA1

                          1397ac6dddefb6c4730a8a1df561e6574b09e4c1

                          SHA256

                          bf7cc0ee2ef6dcd2a0898f9cca393980071ddd922148bbb1feec7af3fc69a98f

                          SHA512

                          6fe80b5f09663932f16d2fa1e57b97a63bb7bacb5b9681d0c0526231a62e51060167b7f9c874f92ea36138a43df0ee73bb5929dabdb8a2e7682f2184ed48a7d3

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          72dd937480474014413d46cdc30be333

                          SHA1

                          78a2f6d7609511e24d9786a43849109fddeb1f5a

                          SHA256

                          682b69ac3417a2e97ca80586be45d3504c7b3c1256e83c7653d3bad8a40c4d4d

                          SHA512

                          53cf9325f974f914338b7b129c69f8486818d8a03fcd146ed9bc04b0950353004b73a19ebab39537aefdaf5363517f771136e594a5e0028a9a01b91e00760334

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          073e546c24df12874ebab9f6f6f6c108

                          SHA1

                          7b117d8dd0088c7d3a466f3a73e1e5441a65b381

                          SHA256

                          48791b94b8181a4860249e7668fa1301ae8ba0cd58d09dc089f981ff1a5efdee

                          SHA512

                          7a2bb179fd13dc23f0908b4be83f806d6881fbbbeadaa0aeab03ffb538cc68b11bde968a545aa2a8551869572b0c00310af51a2c3362b48fe303886e4dd2894a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                          Filesize

                          16B

                          MD5

                          aefd77f47fb84fae5ea194496b44c67a

                          SHA1

                          dcfbb6a5b8d05662c4858664f81693bb7f803b82

                          SHA256

                          4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                          SHA512

                          b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          55f952d1296cc9f4b05793b87a89777a

                          SHA1

                          ca850252991231191e1190ed3c6c5469ef08df7a

                          SHA256

                          a1d0cc31a1813b17c1af94285e4d5ee5388d9497ac80aa13820ad94e96376744

                          SHA512

                          d96fb2c635b8d2895f0de8f921bdb95e449511455cdfdc0cc92eb2b450c72ef299cca01c8ff112ab5960819b51008937796fade27ac2b4e10b15d10d02641396

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                          Filesize

                          16B

                          MD5

                          18e723571b00fb1694a3bad6c78e4054

                          SHA1

                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                          SHA256

                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                          SHA512

                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          305KB

                          MD5

                          5412816991089227ff1fa49d47482146

                          SHA1

                          849694897548403b13368b3b18bd157eb0ff8643

                          SHA256

                          6214d768dcaf1d0b9ab216d18fbd8c97bfba4f1441d5ac6f780586ea3e13b276

                          SHA512

                          6b85275686b075eded6eb0d980e09dcf5ff990e3449b8393db54efd8f750f3d1f63677796d5929f1fd37f108b4fb13853348589869830a750a97912d1aeac4b9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\aaba5dee-1956-4896-8c27-14e81d818e1c.tmp

                          Filesize

                          305KB

                          MD5

                          580e6c76f3da7a14428d21d0170c206b

                          SHA1

                          1c1615982be29999d9c1849fc46379e2ce4f06e9

                          SHA256

                          57ccb1a5c8de2676f5d833759b0c9487d2349b241bbdaef41c0e941e92077625

                          SHA512

                          c173199dcfc11c255e911dc5eaf0362fc9e32a8eb6ec434fa539ef1585e015ca9a0f57b24b9038adaf95bf1cae129584f1e41fdbbb11516255e80704d0ce8910

                        • C:\Users\Admin\AppData\Local\Temp\CabBA5B.tmp

                          Filesize

                          70KB

                          MD5

                          49aebf8cbd62d92ac215b2923fb1b9f5

                          SHA1

                          1723be06719828dda65ad804298d0431f6aff976

                          SHA256

                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                          SHA512

                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                        • C:\Users\Admin\AppData\Local\Temp\TarBACE.tmp

                          Filesize

                          181KB

                          MD5

                          4ea6026cf93ec6338144661bf1202cd1

                          SHA1

                          a1dec9044f750ad887935a01430bf49322fbdcb7

                          SHA256

                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                          SHA512

                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI22722\python312.dll

                          Filesize

                          6.6MB

                          MD5

                          d521654d889666a0bc753320f071ef60

                          SHA1

                          5fd9b90c5d0527e53c199f94bad540c1e0985db6

                          SHA256

                          21700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2

                          SHA512

                          7a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3

                        • C:\Users\Admin\AppData\Local\Temp\~DF64C8BEEAE50EC6DE.TMP

                          Filesize

                          16KB

                          MD5

                          243ecc1e36fc464d372d23485debf1d1

                          SHA1

                          c79ffa371dbf7f49a25c899d2d4e5e0fb3b1c60e

                          SHA256

                          fb0dd8c1d4d78eb2bd7657dfce5f0021e80efb62e77d4cc9f379ee5a2ad28ff3

                          SHA512

                          dba570fe6f9264b92dc42d4379110a718fe4d891435c1d2f9c3b96d2e48f9c576a3f0563d5213d8df86447297d8a5fc611c55b11ea700e50894e06698458d13e