Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/07/2024, 10:20

General

  • Target

    nexhub-fivem-cod-woofer (1).exe

  • Size

    8.5MB

  • MD5

    0246b7c41b69b920db4d528d8f08cadf

  • SHA1

    f5d3de82b9711bc3ed8b0120757babcef22a12e1

  • SHA256

    51566fdcdeb6d0aa02de64197d5db72f0e7ee682b71ea02552c19cbcc98e946f

  • SHA512

    113f1cf8edb4710cc825bb28d46c7e228c34a37c0a1ade6bcf0ca5fb5c159b64379405277f859c5aee8d5f70a620e9e9adabdd77cf93a78cf565669ca167010f

  • SSDEEP

    196608:em4O+ZeImMKc1ck6eNgSI46SuyF+XB4G3psAvECBEubL7q:IZdLKIkRVprvG

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • cURL User-Agent 1 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Users\Admin\AppData\Local\Temp\nexhub-fivem-cod-woofer (1).exe
    "C:\Users\Admin\AppData\Local\Temp\nexhub-fivem-cod-woofer (1).exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:5772
      • C:\Users\Admin\AppData\Local\Temp\nexhub-fivem-cod-woofer (1).exe
        ar few
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3616
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f725cc40,0x7ff8f725cc4c,0x7ff8f725cc58
        2⤵
          PID:4508
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1788 /prefetch:2
          2⤵
            PID:1880
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2120 /prefetch:3
            2⤵
              PID:1928
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2204 /prefetch:8
              2⤵
                PID:5188
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3212 /prefetch:1
                2⤵
                  PID:968
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3248 /prefetch:1
                  2⤵
                    PID:3884
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3544,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4436 /prefetch:1
                    2⤵
                      PID:5648
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4716,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4728 /prefetch:8
                      2⤵
                        PID:4080
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,4508459717298516014,619226669236891009,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4724 /prefetch:8
                        2⤵
                          PID:2556
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                        1⤵
                          PID:2140
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:5112
                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                            1⤵
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:3212

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            423fd42faa2fdae8bacbcfc880d76c2a

                            SHA1

                            6c22da0244b5c3ae9afe1c6f33428751770bd6df

                            SHA256

                            8e1309ff2659fb60d1bce72dd6f882ae36957bf307f729e80f2fd2f0ac797d83

                            SHA512

                            e56dc456929a64cf86eb2ae134bf3167726bc6fdfe13453868bb7b5bd94fa012c43346216d8206b9f5b9fc6766d712510c9d816cb42ab69ad6317a074388dda2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            354B

                            MD5

                            1abca686f6326636b7a15d50000b28db

                            SHA1

                            fec0b9a9556487c0ab9023cdb1356ab02c19eadb

                            SHA256

                            4b1c2711ac1c56b11d0a7c6e15950e603674e6f6db03855bd56a94248d84c3bd

                            SHA512

                            798b0be190cf128aef6b6e04e507a8fe9de3791af0b564b8572f1680f399435090103f8bd8df1c247fcdc93d3b5f319137dbc6a18b92f164252eabbafa46bf70

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            99263cfaea39d99ca33e5ef497d3dd29

                            SHA1

                            0d24398ae99a6baa830ef9896fd7e6eebe1c3634

                            SHA256

                            2ff864bb50bc808e30ab4f4faa6125bf7d17cae54f96fd9f8085ac6135faf018

                            SHA512

                            5dfff84fabaf5f22e72842c1684bcecb3c2bfbcde0d19777bb57bcbf9bd197d68efab400c9f5ff8a393f23a8354bbf085dd97602df672ee3a62bd6a7baf40d3a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            506ef9d3498cf0bbf0a1e04e63ac5aec

                            SHA1

                            2e16f60034b1fc9301cc3ea88e2bdb278c11cd78

                            SHA256

                            9d75685664d7f34403adf488666c9efd4806694514330018b85645a2ecea0e74

                            SHA512

                            ac7fa7a83b87b79ad9aaa4f55eff955ac2967e1664ecbf3a911d9d5d9a49e055d97ff87445b978f976011dc1a2fb9a86c54f2ff5b88c1d77d3a1db6bd1fee169

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            079bae43bf1593c463c5237d5803ec1b

                            SHA1

                            cf8b88e0ca347b96e32e239ef60ae6bd4106edcf

                            SHA256

                            29c3072cf097b3ab55a91e786ab5d10af8627f84aea4d7d9d54260a82957972b

                            SHA512

                            9f2cd10f57ced5fcb216dc95aa1bb52260a72f451fa93ccd2c5b34203c13859a5e37c996136113c8eeb45dc2c9d3fa2478f71ee527a187bf3687b4005779c7ee

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            185KB

                            MD5

                            41b3fb4dea445675c1b3ab7d243326b8

                            SHA1

                            d6ec12ae933b65c444a45311c49919ec6cff2985

                            SHA256

                            210a13f98ab65683489d36a9f21d1cba8af104e6efa7235d2de749f858bc6000

                            SHA512

                            d43013aa3957505ddc9ade5f7856ee9aee94176d83f920a2fda7c31c74a73f22f2f9b46bd3a930822a1a0861a457e4cac604aa4a4fe371dc730e00a5991d0a69

                          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                            Filesize

                            10KB

                            MD5

                            21aa5cd409c26df0f9d85fd262f72f84

                            SHA1

                            64c02f42a4b598f8a85c507717f4f644324ae594

                            SHA256

                            f92207990cba274f6c7a3b8571ebc51bef3fd11369a8a83849379df39ada3f78

                            SHA512

                            84d2b7448dd50f2410ff0b0757e981b0d67e43a6e4b610a20479235f119d5a76b28319ce40df54ed79160bcc34deb6c150ecfd134ba0dd59947e871cfa2fce07

                          • memory/3616-9-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-31-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-22-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-21-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-23-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-26-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-24-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-25-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-28-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-27-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-29-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-20-0x00007FF6AE8D0000-0x00007FF6AF98A000-memory.dmp

                            Filesize

                            16.7MB

                          • memory/3616-7-0x00000219C5340000-0x00000219C5341000-memory.dmp

                            Filesize

                            4KB

                          • memory/3616-6-0x00000219C5300000-0x00000219C5329000-memory.dmp

                            Filesize

                            164KB

                          • memory/3616-12-0x00000219C5300000-0x00000219C5329000-memory.dmp

                            Filesize

                            164KB

                          • memory/3616-8-0x0000000140000000-0x0000000140B86000-memory.dmp

                            Filesize

                            11.5MB

                          • memory/3616-10-0x00007FF8C4B70000-0x00007FF8C4B80000-memory.dmp

                            Filesize

                            64KB

                          • memory/3708-0-0x00007FF6AEEA4000-0x00007FF6AF100000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/3708-33-0x00007FF6AE8D0000-0x00007FF6AF98A000-memory.dmp

                            Filesize

                            16.7MB

                          • memory/3708-32-0x00007FF6AEEA4000-0x00007FF6AF100000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/3708-3-0x00007FF6AE8D0000-0x00007FF6AF98A000-memory.dmp

                            Filesize

                            16.7MB

                          • memory/3708-2-0x00007FF906E20000-0x00007FF906E22000-memory.dmp

                            Filesize

                            8KB

                          • memory/3708-1-0x00007FF906E10000-0x00007FF906E12000-memory.dmp

                            Filesize

                            8KB