Analysis

  • max time kernel
    111s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 00:02

General

  • Target

    AxoPac.rar

  • Size

    25.0MB

  • MD5

    e31b034c840a6ca428091bc572c04ae5

  • SHA1

    d084a8437e4bd0c1cafcc03ccafdfb7af7b74587

  • SHA256

    77c3cf6087b9adba54d0c22ec3a2f99b742bc9cdcf49151952da51c857637d3d

  • SHA512

    4ab2710234014effa8e5ae234bcd7f00a4eb05ea610c99f8b3a32a6df6a6afd2dacdf9034b31a598adba3136f018ff3810902e0b146764545fb3e752d99ca3f3

  • SSDEEP

    393216:BF5iLUoPp72T4SaPM6tEMJ07PDWgA2Iu2FuYTILk0n2bZdq0uW/lIej/ahSwO:BiLUoxycTNEMJWhAG2kQ02bWYIeiSB

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\AxoPac.rar
    1⤵
    • Modifies registry class
    PID:3000
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2192
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1204
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2744
    • C:\Windows\System32\eemqzy.exe
      "C:\Windows\System32\eemqzy.exe"
      1⤵
        PID:2896
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb5d33cc40,0x7ffb5d33cc4c,0x7ffb5d33cc58
          2⤵
            PID:3144
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1796 /prefetch:2
            2⤵
              PID:2332
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2212 /prefetch:3
              2⤵
                PID:3188
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2488 /prefetch:8
                2⤵
                  PID:2444
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:1
                  2⤵
                    PID:2356
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3332 /prefetch:1
                    2⤵
                      PID:4180
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3800,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3668 /prefetch:1
                      2⤵
                        PID:4380
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4708 /prefetch:8
                        2⤵
                          PID:4848
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4424,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4192 /prefetch:1
                          2⤵
                            PID:4012
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5076,i,12678755393030072334,4845805123757710765,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5088 /prefetch:8
                            2⤵
                              PID:1692
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                              2⤵
                              • Drops file in Program Files directory
                              PID:4116
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff702454698,0x7ff7024546a4,0x7ff7024546b0
                                3⤵
                                • Drops file in Program Files directory
                                PID:2940
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                            1⤵
                              PID:2912
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:2148

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                37a7b4240ba33448da9f994a549ad4d1

                                SHA1

                                6287a15cb82977e0c04d8fbddd210ed5fc280c0c

                                SHA256

                                bfb11f0b63296d3e10a8c1b31902156220f57484c78b41d57421f9527d0321d2

                                SHA512

                                ccdd56e74ef4182e19e76441520339e3912a704bca471e7edce624f35716af83b91849daaabdbeef238902302a63cb72b1d230a2472e93f091f418cc9b1e37d4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                356B

                                MD5

                                4afe1dfded31c08929939133c3bfa22e

                                SHA1

                                3240cf6fe050d1cfa880580637df99817a01b348

                                SHA256

                                c6bc4204c60cd5b060f88ba67616578c29ee67aff2450a33dbe5b54e666b85dd

                                SHA512

                                952a351c9b2946815759519792d1a279908584087b39459e67b488884ec238caf06fdae7b4ef241e6ae44ba44b026d0e4ce08ec305431017a4c130856e6d76b6

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                8KB

                                MD5

                                3072624138de43ae9828573e17531888

                                SHA1

                                a6516996ed1020b516f29eb0e93c54a4446720f2

                                SHA256

                                8a844b418964499648b876b7fc411f29375d2921205533f1c12f1c491046e70e

                                SHA512

                                66848466df07f7924a5343fc26b092d36c761780b33f8e07634cd0befec34ac78630d7072fe137552f9cde02bc6fae9fc81dd930aacb4a768eb322ffcd605a7f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                13KB

                                MD5

                                1c51c7cf4b486e13bd756c63315edcb0

                                SHA1

                                3cd62007570a9951deb72c58774f3db2803bd04f

                                SHA256

                                843942894301276229e5456f1833f0d9456afa7353913b4aa6b75d0ee9c765fd

                                SHA512

                                6a44e2d218d3e4b642b04d3dd198bf1c7f1b20c648a1c23916aa7e74d84583e71403db0bf8b0c69f24df172cb8e1914c1088cb8fa0839535c18f5ecbda6f5299

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                194KB

                                MD5

                                eb8d45198bcbeff0bd2357ad7713a2e5

                                SHA1

                                58f9aa028c1c532904c9530cbad4ef985fdb0b31

                                SHA256

                                8a265f1176c65d665589725b8038d9704806ebc577aff88ba5a157b44b77b683

                                SHA512

                                10c389afc661554a04dbaa0741bcc21436e00b7b8478db6bac43d419dffb0bcdca8ce1911e587738362ae86eb256c892f4c9c00fa56a0ab3bd3c1b988db3dd7f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • memory/2744-11-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-7-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-6-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-8-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-9-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-10-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-0-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-12-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-1-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB

                              • memory/2744-2-0x000001BBDEE20000-0x000001BBDEE21000-memory.dmp

                                Filesize

                                4KB