Analysis

  • max time kernel
    18s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 18:53

General

  • Target

    https://info.civicplus.com/e3t/Ctc/DE*113/c10rJ04/VV-bSJ8qvwlsW2T_D8H8Ps06-W7-75Mp5jvgLmN2lhp0F5nR32W5BWr2F6lZ3prW1SX3-34675cqW18K_ls2nYWJ5W3pfcV42Pm_cWW2d49yh2FjsNdN5XfdBTfFrn7W9dwSTC5V2CZ9W9gR2Ds493RcsMT6_GLcTkNmW6Gb8zw3rhSg6W7323zT1g9vt0V9gx7P4pfz_pW48sM9t5SHsgLW1SZpXf7pf0kRW7dGLgS7CnYg5W3Y-Sj42g1TpJW5kQGZq84ZjvxW8Rv4xD7fVx8mW4YKyc87g5bBhW7RTq2B2MdP09Vs-RRM8fkx7KW4_b2cd2NwT8kW3WxbCf3rNrNvW2mlBJM9cSLt_MZZlcJclT7HN15HmKpmQnHjV1xrlV59QwfYW1lJkXf21Y2rdN172nd5mH-lkW7h79Xw9lK5xHW4JRzwn3GLpWCW90Qzns2cDLRjN2nfqc78J8hqW7j8LQ23X3skQN2rGmT-W0rYpf7WzHMj04

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://info.civicplus.com/e3t/Ctc/DE*113/c10rJ04/VV-bSJ8qvwlsW2T_D8H8Ps06-W7-75Mp5jvgLmN2lhp0F5nR32W5BWr2F6lZ3prW1SX3-34675cqW18K_ls2nYWJ5W3pfcV42Pm_cWW2d49yh2FjsNdN5XfdBTfFrn7W9dwSTC5V2CZ9W9gR2Ds493RcsMT6_GLcTkNmW6Gb8zw3rhSg6W7323zT1g9vt0V9gx7P4pfz_pW48sM9t5SHsgLW1SZpXf7pf0kRW7dGLgS7CnYg5W3Y-Sj42g1TpJW5kQGZq84ZjvxW8Rv4xD7fVx8mW4YKyc87g5bBhW7RTq2B2MdP09Vs-RRM8fkx7KW4_b2cd2NwT8kW3WxbCf3rNrNvW2mlBJM9cSLt_MZZlcJclT7HN15HmKpmQnHjV1xrlV59QwfYW1lJkXf21Y2rdN172nd5mH-lkW7h79Xw9lK5xHW4JRzwn3GLpWCW90Qzns2cDLRjN2nfqc78J8hqW7j8LQ23X3skQN2rGmT-W0rYpf7WzHMj04
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff849edcc40,0x7ff849edcc4c,0x7ff849edcc58
      2⤵
        PID:2708
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1748,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1728 /prefetch:2
        2⤵
          PID:4076
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
            PID:1208
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2244 /prefetch:8
            2⤵
              PID:2172
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:1396
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3284 /prefetch:1
                2⤵
                  PID:1636
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4364,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4108 /prefetch:1
                  2⤵
                    PID:3316
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4660,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4676 /prefetch:8
                    2⤵
                      PID:4288
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5028,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5040 /prefetch:1
                      2⤵
                        PID:660
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5308,i,5122471464175546310,3716094341263697739,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5324 /prefetch:8
                        2⤵
                          PID:2596
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:4660
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x304 0x49c
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4700
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:1768

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            4KB

                            MD5

                            e372e0730572d40aecfeae12316c25f8

                            SHA1

                            29b0081446cef89a68a7c9c3fc868c7dc29fffe0

                            SHA256

                            ed70164a4d801647141a80cf02a7ea892356885524d6f29e40f16300949306cf

                            SHA512

                            6f0ee8f8e53119f40afe5ab78f89754a0a8c35c7b894b4a8780d8a2e813a045aa2ed7a075d57dcada1ea7837977e307a9890b65faab70c523245bedd8d547673

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            23bb8fe18853f75d5133d48049c1d5eb

                            SHA1

                            1d71baa27e5e19a7e862fe93dc24912354188956

                            SHA256

                            96d0da39b22a22fc23d8d2c992c894e28631e545b6e904d31f9d607906e1ce6b

                            SHA512

                            3ceddf2e730550fd55f0833177208f7ff38b569822b3ab0219b6b5dbc4f3a93e99c5dce9b5c48bc93cbf2bcfbae0e92cb7ab5df6dfbea3433d5d863c5feae17b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            3171ea73d7a37a94359982a5d57ca179

                            SHA1

                            2c57a3fb05806b47cab1d0b5372dc0150d014979

                            SHA256

                            f1020482690352dc8439f3e504642e27f07a3c6502a8c2d93602a1a5aa207b20

                            SHA512

                            d31c7ccbe99a992abdd302b8d56425a9f7d448d734dbc8a28db42ee3b861471bde9efae3e5c02496ef77d28418970ad46b60b0b1b3c53b506ee875b1c9dc3722