Resubmissions

07/08/2024, 01:25

240807-btc1yszgle 10

07/08/2024, 01:11

240807-bkdacszejf 10

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 01:25

General

  • Target

    2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam

  • Size

    42KB

  • MD5

    20d950e2c3dfc7f4ed68900accdbe44c

  • SHA1

    641722745cdfc41f32fa2c47dda5d0c3e708de10

  • SHA256

    2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605

  • SHA512

    a4f6f2aeaba497b5f9fc740e4b6d34ce2b197c227a8c29499bb7ea1bb50ceb015c21ef92f8a7b35c418ff5b585d6aac96f723769e6095c42ad9ef39744ba921c

  • SSDEEP

    768:VPvsRQIHQyna9M++zYElhWc0MGVY+EvR0nNy5UTBJLYYM3L35t0g+Ut/LdspuYzT:V8REE+o7fWc/v9Ul83D5t0g+m/LdsI8T

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\2343875e27c07a7b34b6e97c716568204881cd0588ca1f040774aa088504a605.ppam" /ou ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4424
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
    1⤵
      PID:4884
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4376
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffcbb1dcc40,0x7ffcbb1dcc4c,0x7ffcbb1dcc58
        2⤵
          PID:2308
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1900 /prefetch:2
          2⤵
            PID:3824
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2212,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:3
            2⤵
              PID:2136
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2444 /prefetch:8
              2⤵
                PID:3220
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:1
                2⤵
                  PID:2976
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3448 /prefetch:1
                  2⤵
                    PID:648
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4624,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4660 /prefetch:1
                    2⤵
                      PID:1176
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4668,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4932 /prefetch:8
                      2⤵
                        PID:1344
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4864,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4872 /prefetch:8
                        2⤵
                          PID:4300
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5012,i,9364021881022857126,14483600880311638015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4860 /prefetch:8
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4100
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:2568
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:1844

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            1431be7854a7ec9af4db5eb2d3ba29ee

                            SHA1

                            0d018fea1ff4a070936c48aecb88e87e34ce550c

                            SHA256

                            708c90410f4cb3559427f93ffef25cd3f89469c1d2e7301ff5ef07fc8955e625

                            SHA512

                            b109495d3242d2beb2fde5fe3644d907ba69079e69e2635dde8ca022a091877ca046c3ddd9a011b8988016050ee172f1ca8cfe19f9e09aaba7003f354834ecaf

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            356B

                            MD5

                            0cd810fd225af5247c1917343ea874a7

                            SHA1

                            e94dea3a6b751ce9007bb930348f9a41ca83d4d5

                            SHA256

                            95d65d99cc8d1f02d1e9430c6fa7b6e70f395742c71b2d85c7638d162127d177

                            SHA512

                            19d5e9dd76938ffbcb73e285142d5b7cfc0ac2f471233e1081b868bf893c3bead4bfb55517cd3da5a91592ed4a20aabf05793cfa25d28c6a4de0b076279bcb87

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            4ad440c3c70e5a9555b95c0db3451b79

                            SHA1

                            bdeb4522b892c8ed83e69651edf49d00c5b4af07

                            SHA256

                            87489e5a909613fd8e5ebde50bcff0e75934d36be25ad680d6ce106c1f508fb7

                            SHA512

                            94a9e998a5dcf1c04d11d3144488088c8d430542c52f5cc9396cdfe0d84d192336a62498285aa4c1b3839d658b92ef72d1e635b9a36a69a2aa28a2c92f132735

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            962e07c75339b547bb691b9e01ff179f

                            SHA1

                            09b8915e7db09e695d0128461e3e3e2b25feabc3

                            SHA256

                            c71bf53041f75815717466dd1543a27c66bf987a42b835af942d3018a646a789

                            SHA512

                            611520ec6bce83504ae27551242d929b3c3bf86a553b850f088b218f7ad374939e5b09d4efc3e327c5a7ce5ccf3b7bbe2454f9dde7b236cde1ecc3301e7212fd

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            d77825d93d8299339d30309cc3a67129

                            SHA1

                            f363ebd51725ff3483fed3745c5d32cc574aac3e

                            SHA256

                            0261d6e871c03f5750ad896e7b911d75d37f71d886e29849921ad4cd4bc78f72

                            SHA512

                            0c6494831593ac62a40806c7d828b3c6cdf8db8e8bbb0b4c8c3256476f258dbc1ef45d60de1bf4f1b5e2cceeb53335dbefd0e14033628b1797149fb83ff20aa9

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            ce75b84c8e504f6f2e39df69051f878f

                            SHA1

                            09bc76f3e3c80e2cf844964dbf6b1ac40b5d582d

                            SHA256

                            9f265dd90162aa55816900f0f8fd424a391370330aaa3f97f5c4c52ab21dcbd4

                            SHA512

                            b2d412f52230de2227b07753212ffbefb85dfdd659e2d30607619805486015e70260c9daefbd89ba8a8dd6d84b5a1d4b0a98190e9c43ea471ec8a0df14c7598e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            7c6cdf1670b3eff67eeda13e8a347e29

                            SHA1

                            cae9d8ae11ba81fe766c33b02bc1380cab21aa2e

                            SHA256

                            dc5a39067e5db73655ef1a350405672ed0f5d87c7b8f16169edee6f9afe7967c

                            SHA512

                            a6fc8725e3591b87dd4624e06728cad156e14251b249cd347f75fb63300651ce040feb8b8f6775d793ec0422d0396b841852e1dfe144808a22fb4f7022ab30b1

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            77c0114d0e18545a7af758243c3d56cc

                            SHA1

                            6e041e758c0a87662061753916902db0098e1c7c

                            SHA256

                            93f6e7defdf4d14227912c1250b3102a2a0bd9f414c70e1895144227f2ef99f2

                            SHA512

                            567a922c7710f9d295cbc2bee986b642081fd74638bcfbb254659b60b98c812ca6c93cc157c27b00889e1f3438229e6fca03172c81596b12e4e4b67063ad350b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            91dbb9554b2b691712a12cc670e7dfc3

                            SHA1

                            2d3bc10132c31c919153f76a268e72e608ecee8c

                            SHA256

                            752d1998cb867441108aadb69f2417c86f11675f7f446f307c812f321155a83b

                            SHA512

                            d117a4939575b4d1b02c75b5913a38e4125ee4f7119b554307bce08e18978e8b0d0f0822f8f2478a9b651d1ee9d99f64b8c8b638699f78ea92a91b52bf40956a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            194KB

                            MD5

                            5bed92ae2782e23aefd441781600575d

                            SHA1

                            8294f2f7be9d8e2cb1a42ef22a7307b6f7e35cf2

                            SHA256

                            2ee89a42e37c736285f8838d805acff96f531194137e022cdc252e19b8cad9e3

                            SHA512

                            be56427fcc63e8e5326e60c645de16fdc7750e4111a93765a33a6cf9d990e8ac2af40f97193bca233620b748bcd626b938d79483ee94248ea39de21ce38e194e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            194KB

                            MD5

                            183850c13a482a6a8bded374e710a4de

                            SHA1

                            618e5bef6ea61a46c7a51b0e16eec730372d87f1

                            SHA256

                            2c4210d95686870485f35f09e1752429affd0d1b0cee970ac3166eefc2d05155

                            SHA512

                            e31f3fefd057b2a366830712bae5305f782acd21f121a9f75cf68226a20a09c53a8cf04801d601700227936ed6d8670f6356cdc5a0fe329d615d2594b25bcf70

                          • memory/4424-9-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-13-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-16-0x00007FFC96FE0000-0x00007FFC96FF0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4424-10-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-7-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-25-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-26-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-51-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-15-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-11-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-14-0x00007FFC96FE0000-0x00007FFC96FF0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4424-17-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-12-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-0-0x00007FFC992B0000-0x00007FFC992C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4424-8-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-6-0x00007FFCD9230000-0x00007FFCD9425000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4424-5-0x00007FFCD92CD000-0x00007FFCD92CE000-memory.dmp

                            Filesize

                            4KB

                          • memory/4424-3-0x00007FFC992B0000-0x00007FFC992C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4424-4-0x00007FFC992B0000-0x00007FFC992C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4424-1-0x00007FFC992B0000-0x00007FFC992C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4424-2-0x00007FFC992B0000-0x00007FFC992C0000-memory.dmp

                            Filesize

                            64KB