Analysis

  • max time kernel
    1800s
  • max time network
    1425s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-07-2024 09:46

General

  • Target

    https://mega.nz/file/dd0x1B6B#DaJ-t_bBAT0XMbtKXe8dTBTznHkH7dnkgS2eLJR9fnQ

Score
10/10

Malware Config

Signatures

  • Detect Xehook Payload 1 IoCs
  • Xehook stealer

    Xehook is an infostealer written in C#.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/dd0x1B6B#DaJ-t_bBAT0XMbtKXe8dTBTznHkH7dnkgS2eLJR9fnQ
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5e65cc40,0x7ffa5e65cc4c,0x7ffa5e65cc58
      2⤵
        PID:2352
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1824 /prefetch:2
        2⤵
          PID:2880
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2104 /prefetch:3
          2⤵
            PID:1596
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2160 /prefetch:8
            2⤵
              PID:1784
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3112 /prefetch:1
              2⤵
                PID:728
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3392 /prefetch:1
                2⤵
                  PID:4104
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4544,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4556 /prefetch:8
                  2⤵
                    PID:4260
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4364,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4776 /prefetch:8
                    2⤵
                      PID:1548
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4972,i,3250341602496029136,11151629024443140355,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=5116 /prefetch:8
                      2⤵
                      • NTFS ADS
                      PID:5240
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                    1⤵
                      PID:2384
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:580
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004D0
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4824
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:1888
                        • C:\Users\Admin\AppData\Local\Temp\Temp1_btc wallet backup.zip\btc wallet backup.exe
                          "C:\Users\Admin\AppData\Local\Temp\Temp1_btc wallet backup.zip\btc wallet backup.exe"
                          1⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1388
                        • C:\Users\Admin\Downloads\btc wallet backup.exe
                          "C:\Users\Admin\Downloads\btc wallet backup.exe"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5844
                        • C:\Users\Admin\Downloads\btc wallet backup.exe
                          "C:\Users\Admin\Downloads\btc wallet backup.exe"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1332
                        • C:\Users\Admin\Downloads\btc wallet backup.exe
                          "C:\Users\Admin\Downloads\btc wallet backup.exe"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3540
                        • C:\Users\Admin\Downloads\btc wallet backup.exe
                          "C:\Users\Admin\Downloads\btc wallet backup.exe"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2232

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          120B

                          MD5

                          95550c63ee51c041f618715ae1a564d6

                          SHA1

                          2ffa53fc3a90ede936f74844a94c60ed95234103

                          SHA256

                          770fc4f72bbdbc3ad0e1e7605504c360c925ec3a1e4d7fbf3662d4c5f89f0a1f

                          SHA512

                          cbdcef42ebd6fd2c156e8d6a2b5b85178d6a8dde3e327166ac6d612f29454845166a1e1504945169badaaa9125f4851380a1a707ade56009ea29ff3ad60ee350

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001

                          Filesize

                          41B

                          MD5

                          5af87dfd673ba2115e2fcf5cfdb727ab

                          SHA1

                          d5b5bbf396dc291274584ef71f444f420b6056f1

                          SHA256

                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                          SHA512

                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          523B

                          MD5

                          81408891c622e13d4646ea5c07fa616c

                          SHA1

                          edf67067bf153135711ca129ecbe9d0375956a5f

                          SHA256

                          31ae4fec8e01c5c87229990ecfdb3194dca472dccdd23bd55ae3388d186b973e

                          SHA512

                          b3a179e74f4f4debd71df019a668067e1a1bce3c2ef410f683f54a668325f7bf78c5a9a2bfd6fb05670feb7eaeb6998e9fac9e86271a24b6963f24274b690d02

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          24b85af6c623061b17f59cc3597bc026

                          SHA1

                          6c8010f9add3c64b5701621c1871a7c935ba1c7a

                          SHA256

                          021f05ab35ae803ae26993a49ab2ed649218daa574765e5ceb6af9253a032e93

                          SHA512

                          7f4e20fcc7ae264d398cf52209046268bb393fc938affe8c73bfc2ad08fc6fd11d29e2cbb8369656c554b4d1b4c549c4284b9710659de81cdd2cd48be23ed1f2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          54e6d0dfdd274e992aeb0dc49bf031c1

                          SHA1

                          b82198ca8dd5f1d9e331ee73167837449d60a3b7

                          SHA256

                          b145aa70241cd1e6c4b785d3bd1b399a02cb08d39aafc00ba453817ed50b391a

                          SHA512

                          5f888c885053ba93f8580f4437db862e0026fdb1b894d3412b23fc5d7766c9519eea738033863f43c8e5625daa7d90ed4d4a788b9edb140dae3175892ea9d3ac

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                          Filesize

                          96B

                          MD5

                          b289ddbd9c6174ea9c03a05001b8d4a6

                          SHA1

                          e972d44ab9e71b58028e95ef5447da7f5c05ec16

                          SHA256

                          d85029719c336048a0ba3e0baaea475f516297f18ca89af9d7e51644848599c5

                          SHA512

                          88d7aa8f4a6992038ee12c8a2dd5a990818bf7a3459bc05aa4733501251c13e3afbe7c5329f474ddbb7fe700c1ebf3b295b3cb62300d81c8611a57885ac23804

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                          Filesize

                          14B

                          MD5

                          aaa1d3398c11429309df446cc70a4b24

                          SHA1

                          426037d880450cfe67c0db4e8836d8cf67c3af33

                          SHA256

                          d3c5bb416732a0643cb435ce980e4cf7ed0d96375d6d1d866565ffa4cf5f4e31

                          SHA512

                          5400a74ad59ee80e11b97e884bedee53af567520b807e4c3c43b68446bb495a967e22838aeee4bfbf02486ec5abfb2e821c5165ab2b894a54e0d7eb70c7355a9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          93KB

                          MD5

                          d2a21787f8a1d0dc30cd8291309a5a1a

                          SHA1

                          9dcdb483f2af5cf0bae3114282643418148a1e05

                          SHA256

                          e3127f063fc4e28ffafe135c605e47eeaf82831b689faf61928ce66ca1101ea1

                          SHA512

                          75d546d775cbf36f470f74911aad440ebda72d041fafc7a9c69b5f5b43ab31e3ce8e547264dd55dc6581d1de41f5ebf137942205be1e92569924372680ee645c

                        • C:\Users\Admin\Downloads\btc wallet backup.zip

                          Filesize

                          59KB

                          MD5

                          0b0a783735e82b6b35f5919abe4dbebd

                          SHA1

                          775caf9511d58c066255309efb26f924b0d1d617

                          SHA256

                          0cac08224b1ded1c8d8b51826060fea14a4fc4bae9b04f44f010be3075a8efc6

                          SHA512

                          e3c41bdb495a69cf5b21be0f5a1bfd03a155cf7534930d5e776a335d50f19cac45b543f0510842285f36e52fd5e0eb6804989a564fbb5f86265e1a96c9e4bc98

                        • C:\Users\Admin\Downloads\btc wallet backup.zip:Zone.Identifier

                          Filesize

                          52B

                          MD5

                          dfcb8dc1e74a5f6f8845bcdf1e3dee6c

                          SHA1

                          ba515dc430c8634db4900a72e99d76135145d154

                          SHA256

                          161510bd3ea26ff17303de536054637ef1de87a9bd6966134e85d47fc4448b67

                          SHA512

                          c0eff5861c2df0828f1c1526536ec6a5a2e625a60ab75e7051a54e6575460c3af93d1452e75ca9a2110f38a84696c7e0e1e44fb13daa630ffcdda83db08ff78d

                        • \??\pipe\crashpad_3128_JXUSRXCUDEDTWFZR

                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                        • memory/1388-192-0x00007FFA48473000-0x00007FFA48475000-memory.dmp

                          Filesize

                          8KB

                        • memory/1388-193-0x00000000000E0000-0x000000000010C000-memory.dmp

                          Filesize

                          176KB

                        • memory/1388-194-0x0000000000A50000-0x0000000000A6A000-memory.dmp

                          Filesize

                          104KB