Analysis

  • max time kernel
    75s
  • max time network
    91s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-07-2024 19:25

General

  • Target

    FieroHack.rar

  • Size

    109.4MB

  • MD5

    fa9cfaaeac688329746d1a151688d59e

  • SHA1

    403fcf7f5d936f5de6953fe38ae0433e376d64bb

  • SHA256

    415a08e5957aa68fcda0937a9c7c7592e16de542e33c169d877cb4ed8f417daa

  • SHA512

    5e4071d290bcfc43d6f35d7a7076b2f38f4250f5a16cade1f37362e559a9c9fcba4503aa9befbd84fab544ce8131aa6bc4fb87760ddc6400cf872394082f22b5

  • SSDEEP

    1572864:VP2dJJT7kbpGkoaJzUG1uBIxLEPXMVG2kviJOXHaSJhPsUr/D9BQdXLvxj:MrJTIbMk3OIx+4GN6JOqSJh0GvQdXLvd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 38 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\FieroHack.rar
    1⤵
    • Modifies registry class
    PID:428
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\FieroHack.rar"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2044
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2372
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff910adcc40,0x7ff910adcc4c,0x7ff910adcc58
        2⤵
          PID:3620
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1860 /prefetch:2
          2⤵
            PID:1008
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1972,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2156 /prefetch:3
            2⤵
              PID:5112
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2252 /prefetch:8
              2⤵
                PID:2820
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3268 /prefetch:1
                2⤵
                  PID:2676
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3324 /prefetch:1
                  2⤵
                    PID:984
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3580 /prefetch:1
                    2⤵
                      PID:424
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4284,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4572 /prefetch:1
                      2⤵
                        PID:2408
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3452,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3296 /prefetch:8
                        2⤵
                          PID:2660
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1568,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4304 /prefetch:8
                          2⤵
                            PID:2180
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3420,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3512 /prefetch:1
                            2⤵
                              PID:5004
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4984,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4968 /prefetch:1
                              2⤵
                                PID:3480
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4816,i,10669790261588063777,8438939035758419594,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4464 /prefetch:1
                                2⤵
                                  PID:1052
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                1⤵
                                  PID:3120
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:2880

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    13d90d42f6b5c2ab9cf9acfeefc924d5

                                    SHA1

                                    7960dac56ac9051e1e510e892b2a1f349776a08b

                                    SHA256

                                    37b79e3b4d2648beee06558b25dd019e27749b5fba00ce3c838b8632cfb22fd9

                                    SHA512

                                    1b97caa5cf3de66c64de86e2e8ab5b306fbfe84a4a2bdd3e92deb7f25d2bf667501f55acbeaf5138527927e3c53d386656291087d44e9e125fe87807d6be1c70

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                    Filesize

                                    210KB

                                    MD5

                                    5ac828ee8e3812a5b225161caf6c61da

                                    SHA1

                                    86e65f22356c55c21147ce97903f5dbdf363649f

                                    SHA256

                                    b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7

                                    SHA512

                                    87472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                                    Filesize

                                    24KB

                                    MD5

                                    c594a826934b9505d591d0f7a7df80b7

                                    SHA1

                                    c04b8637e686f71f3fc46a29a86346ba9b04ae18

                                    SHA256

                                    e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610

                                    SHA512

                                    04a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    216B

                                    MD5

                                    4d593d673da19a10ed99b7e7d85540e7

                                    SHA1

                                    16b04b02a7c9ba8daf31258459f808a91b247603

                                    SHA256

                                    f56508f6106ee76a4a6ba82b870d69677a62e40cd681d90840d98964287722fa

                                    SHA512

                                    d8258ee126541bd1f3b45313c8c539d58c45f967a46a183cec6378ce8e92c1e3cb0607735ef8fff452a13c05cc927ec785559378569dd47c465925fc92e60e4c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    2KB

                                    MD5

                                    01c25b6952348160ebf420caf03aebea

                                    SHA1

                                    ad6fd391f781f1fa714f197ed2ec3f6f7d83065e

                                    SHA256

                                    82176282e6dbdc49c75ffd27bbf97f7f18699db9e39440579488e0cb0dce302a

                                    SHA512

                                    818502679fbd9dcb402dc65079a092ac3a8dcfa91df53e96043eb050ed0fd7800abf23dd3dd066377809bcad9616b732284c4ff63f0fc2b6b694d9de3cce83e0

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    60098176df034a8fac9cad89ed53061c

                                    SHA1

                                    a44eab802c76e6a76781e04a96df6dcf220cdd84

                                    SHA256

                                    cc46b70484fb7c09fe3b816da7112f5dd3abffa20e05b9b86874392babde146f

                                    SHA512

                                    2cc3ac740cf13b89c6aa257c0f5d55e0dc255ba645af8bc54ecabc6256d196a436e975cf03f7d1598b4ff73b2c2b566969b33215962e93cae1296fc00b664e7a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    8b1068d47eaa079188d5c573cb732900

                                    SHA1

                                    d0842546fac4c8fe4fee13feabbd4d2446b3d918

                                    SHA256

                                    1062fa117d1c0c2bcdcee1c660a36ae5eab74e6b6eb3987240edc79d30ab8405

                                    SHA512

                                    1a6e528a6029c0b5392de6d1a8cb32a40a673dcb8b3f4265c4151ed944fce91ce9a526bc3ede8888eb147e6c8cfa53179b2b3bb98fc8d36872075ce32db426e4

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    a13f356f4757af6d6a532994212de870

                                    SHA1

                                    a43c44ee744370262c1236e1c3ba956457d53be4

                                    SHA256

                                    060eb868402368a7a64fe62a639795b9cd7b87d53ac39fc1899f44b0eb6f147c

                                    SHA512

                                    660cb6df7493f18512b70e3c097fe338f784ea957c859ba820091f92011fb91e7d71c2ba62905a50118d4b96fe010014e4b798e3e5b0aad168cea21b238a6048

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    90f2caa526b0a165c80cd6b76c524e33

                                    SHA1

                                    c4b242e49a99e46c281a55955b4f1345c7dea1b3

                                    SHA256

                                    71acb792eeab88a79ee7e08a5a21312cdb582d573167bba7617219b738a276b7

                                    SHA512

                                    a0a041afb6beb0f1184fd6b355e8fd8ea5532233c17c76a6b120733660f30b0b3e8775a261b501056476c8ce58933026ab766b0be83282487eef7ec1ff08d519

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    15KB

                                    MD5

                                    bcee1f780ca3e80c36fc21101211dab3

                                    SHA1

                                    7deff23b6bfc99e567713396f3fb8ee6e365169d

                                    SHA256

                                    0b69c3686dc4a6bd11c1771015733de254af50152776a8188b4985c4543e7f2a

                                    SHA512

                                    ba3e1159de32f6bde5e98f0f5bb4c382416cc778e1a0aa0c158d31720bf7bf767af693873c8f974b9c94f89773ca6fb777d0d247ba32b2816d7b57773dbd6f14

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    188KB

                                    MD5

                                    d68338aa38f314743e2dcf7541ac34a6

                                    SHA1

                                    d686608d76a0d15dbc56f6b4b29d73e19f0bbff0

                                    SHA256

                                    ccb29035133b29c37dc07a756502da16054ec165509fdd517a167f3373341bc6

                                    SHA512

                                    b9b63933d942478e6a26035e886c334ff21cdea92cb8bf5058e293d5039560433230fe28e54a3a7c20ec2f6e42ddb68da15b8af8709737e55dba9a68662df000

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    188KB

                                    MD5

                                    5f4ebf80bc4e9638d8e11e6a03a2800f

                                    SHA1

                                    bb7d71a5757c94121d511ce5ce4d67c3f6101a3b

                                    SHA256

                                    2eef0471e0ee8ea96c948265f12824691705955f5559b09cc33ec6eac7dd74e9

                                    SHA512

                                    1101d80225a5fd6039a528d323e2b21d5bc7a9bb54b4a8f9ea5d139012f572ccb0e5c8be95bf6ee4387a0a55de1af44a9cc8093b7a974e704d07969a519132a1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • memory/2044-17-0x00007FF7ADB60000-0x00007FF7ADC58000-memory.dmp

                                    Filesize

                                    992KB

                                  • memory/2044-20-0x00007FF9036A0000-0x00007FF904750000-memory.dmp

                                    Filesize

                                    16.7MB

                                  • memory/2044-19-0x00007FF910970000-0x00007FF910C26000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2044-18-0x00007FF915530000-0x00007FF915564000-memory.dmp

                                    Filesize

                                    208KB