Analysis

  • max time kernel
    55s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 05:52

General

  • Target

    https://media.discordapp.net/attachments/956622813937139773/1129234398961741845/SPOILER_VID_26830720_040432_628.mp4?ex=669728fc&is=6695d77c&hm=968a69c93a21414442cbd40d7a8f6225c16c0e6e69057a02a752154f2c8a7a9b&

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://media.discordapp.net/attachments/956622813937139773/1129234398961741845/SPOILER_VID_26830720_040432_628.mp4?ex=669728fc&is=6695d77c&hm=968a69c93a21414442cbd40d7a8f6225c16c0e6e69057a02a752154f2c8a7a9b&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc833ccc40,0x7ffc833ccc4c,0x7ffc833ccc58
      2⤵
        PID:4740
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1988,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1984 /prefetch:2
        2⤵
          PID:2108
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2172 /prefetch:3
          2⤵
            PID:4988
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2420 /prefetch:8
            2⤵
              PID:816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:1584
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3288 /prefetch:1
                2⤵
                  PID:4952
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4788 /prefetch:8
                  2⤵
                    PID:4008
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4984,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4880 /prefetch:8
                    2⤵
                      PID:228
                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\SPOILER_VID_26830720_040432_628.mp4"
                      2⤵
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:3596
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                    1⤵
                      PID:3012
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:3364
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x2f8 0x440
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:448

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        8KB

                        MD5

                        5f3cd6810848d11a159413b6ec98f33c

                        SHA1

                        8e8858eaee18e417422b73474ff9d2ce9f945ae7

                        SHA256

                        a851c0c41a27934713fbf2cd22bd6e7932b570cf1262bdebca2699d74b918e62

                        SHA512

                        7ad4081fb4f3a93d6ee4f2ff1922918a0b717e06b743af7a579b590696ef530a83d02c2d415ccd66ed87cf39be46582f241d01f20f3d7af2346daee6ac5b9be6

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        8KB

                        MD5

                        83b9aff4260afbf4828c7ed5272d4207

                        SHA1

                        1cf24b70a59e0569387dd89d6079cd7fdf0a6175

                        SHA256

                        ec6f7106390f2e4c0a85df8e59f75f5145d5247b97f95039f85a7d20d1d59020

                        SHA512

                        870b807daa39c078c404dc79f608a169cb23d63af4435d52a1dec7a9e031ff50e129bc86501d685a8619d7cb3a51b9a565bed66293c3ba0b2021ef80f23cd90e

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        8KB

                        MD5

                        631e251a2351e23e2e29adc1b739f0a4

                        SHA1

                        99b6b813e6831354528eed31bfd95fe5df3522cb

                        SHA256

                        b03285095480071b84d305b1bce06d70b535d6c05d6781b9b372edf2fa6c8296

                        SHA512

                        f5b201c2fa9cae736d489df510ac20f446fc154910c922e7da03651721c3fd59b2c715fd1833d355d285692969d502d46b543858803857d85cb6e300b8869a21

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        8KB

                        MD5

                        e91a5d416169e3be1493b9a87b76c250

                        SHA1

                        047b0bef3a1b921df5e7219ac7760f7384dfef4f

                        SHA256

                        8cd9ec36640894c4835ad2d0c1991995628f07f20d4aa17addaa947e3fb3d013

                        SHA512

                        7bdc7f5e467c907dd3f6712268aadb34c0126abcff7e5fdf76e0a685dbd3f88c2dc44bb61c2812742ab20a3846231bfb40c656e7d6ce9d7393fe934129479179

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        92KB

                        MD5

                        af2bf6fb024c39edc1f876f3c98ea6b7

                        SHA1

                        9bd1abb20ae649b1a1ce960b9a5821bd5d64a267

                        SHA256

                        7e5de82ee79fe921f255166848bcfb6ce9ce58d8e499607bcaff7f00b57f696e

                        SHA512

                        ed0daa35a7bf115a9af92371121a2cc366758689e84d85e00fdcc7e97b7a3b8d3b3fb6e39b35c6ee00190c83a4190b9c7b19e5ef4b2efebe6a3c22fb621dd6b9

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        92KB

                        MD5

                        764c3fe7417ab96614bce7004b914be8

                        SHA1

                        56a64e1fcd0238bddf749442583348018fc2f200

                        SHA256

                        abaa263bd9abad5692c10ba80ab4700f6c78a7f05ce861ab32e9fc667956bae4

                        SHA512

                        a06aa199c4f051dc9b620f65e193a6307055cf5cd7caafc1113bbbccad8fad8759a0b5f3a7e4853183375e234a2c7571f14faef3ca41ab78ee3dfc02e5fdd69e

                      • C:\Users\Admin\Downloads\SPOILER_VID_26830720_040432_628.mp4.crdownload

                        Filesize

                        4.4MB

                        MD5

                        2be4adb593ab13447cc51594c4cfbe30

                        SHA1

                        4b796927e18829c315ecd94d2d77a16557578e09

                        SHA256

                        8d951b5b36cf424b25ef12323ecae2d31f8e04ee414421e321876e7be4a63941

                        SHA512

                        d59c3566f6fc07ac250c8c523edb93809f12f966eb4a05e8ff561171f899a5c328d3c61356b9cc2656149e6067dbed834e9f253b7d807c9322d0f26c50af6f45

                      • memory/3596-68-0x00007FFC885A0000-0x00007FFC885B1000-memory.dmp

                        Filesize

                        68KB

                      • memory/3596-77-0x00007FFC82CE0000-0x00007FFC82CF8000-memory.dmp

                        Filesize

                        96KB

                      • memory/3596-71-0x00007FFC83280000-0x00007FFC8329D000-memory.dmp

                        Filesize

                        116KB

                      • memory/3596-70-0x00007FFC834F0000-0x00007FFC83501000-memory.dmp

                        Filesize

                        68KB

                      • memory/3596-69-0x00007FFC883C0000-0x00007FFC883D7000-memory.dmp

                        Filesize

                        92KB

                      • memory/3596-72-0x00007FFC82D00000-0x00007FFC82D11000-memory.dmp

                        Filesize

                        68KB

                      • memory/3596-67-0x00007FFC89E50000-0x00007FFC89E67000-memory.dmp

                        Filesize

                        92KB

                      • memory/3596-66-0x00007FFC8B050000-0x00007FFC8B068000-memory.dmp

                        Filesize

                        96KB

                      • memory/3596-80-0x00007FFC824B0000-0x00007FFC824C1000-memory.dmp

                        Filesize

                        68KB

                      • memory/3596-79-0x00007FFC824D0000-0x00007FFC824E1000-memory.dmp

                        Filesize

                        68KB

                      • memory/3596-78-0x00007FFC82840000-0x00007FFC82851000-memory.dmp

                        Filesize

                        68KB

                      • memory/3596-73-0x00007FFC70CE0000-0x00007FFC70EEB000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/3596-76-0x00007FFC826C0000-0x00007FFC826E1000-memory.dmp

                        Filesize

                        132KB

                      • memory/3596-75-0x00007FFC826F0000-0x00007FFC82731000-memory.dmp

                        Filesize

                        260KB

                      • memory/3596-74-0x00007FFC6FC30000-0x00007FFC70CE0000-memory.dmp

                        Filesize

                        16.7MB

                      • memory/3596-81-0x000001EC528B0000-0x000001EC5411F000-memory.dmp

                        Filesize

                        24.4MB

                      • memory/3596-65-0x00007FFC70EF0000-0x00007FFC711A6000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/3596-64-0x00007FFC83440000-0x00007FFC83474000-memory.dmp

                        Filesize

                        208KB

                      • memory/3596-102-0x00007FFC70EF0000-0x00007FFC711A6000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/3596-111-0x00007FFC6FC30000-0x00007FFC70CE0000-memory.dmp

                        Filesize

                        16.7MB

                      • memory/3596-118-0x000001EC528B0000-0x000001EC5411F000-memory.dmp

                        Filesize

                        24.4MB

                      • memory/3596-63-0x00007FF76F1F0000-0x00007FF76F2E8000-memory.dmp

                        Filesize

                        992KB