Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
ConsoleApp5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ConsoleApp5.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
ConsoleApp5.exe
-
Size
11KB
-
MD5
ec2ab4b17f0a8530416f5a45d4d563d6
-
SHA1
32e8612c28e0c9249d8acc3a5e204aab2a08f8fc
-
SHA256
540a758f387fee0a792f1c52cd04e2f356e72cbce6c7313fb376a222dd0bae3b
-
SHA512
f24dabd46d92dbc157c6788cfb176b56cf01b025e6f16e836c1e281f5cc294afca287c42ec1aedf6b396410e0fb2d29046ee1d3c2de0b5df926d3edf71b6a82d
-
SSDEEP
192:uFHE2y0jMbj/eSwNJ+doZni5n8fyYsCMU4GEQH9vzE:+y0jM/DB8i58qYt0tg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ConsoleApp5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConsoleApp5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "200" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeCreatePagefilePrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2996 shutdown.exe Token: SeRemoteShutdownPrivilege 2996 shutdown.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4104 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 2360 552 ConsoleApp5.exe 92 PID 552 wrote to memory of 2360 552 ConsoleApp5.exe 92 PID 2360 wrote to memory of 2356 2360 chrome.exe 93 PID 2360 wrote to memory of 2356 2360 chrome.exe 93 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 4108 2360 chrome.exe 95 PID 2360 wrote to memory of 1568 2360 chrome.exe 96 PID 2360 wrote to memory of 1568 2360 chrome.exe 96 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97 PID 2360 wrote to memory of 3656 2360 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ConsoleApp5.exe"C:\Users\Admin\AppData\Local\Temp\ConsoleApp5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.google.com2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff90e94cc40,0x7ff90e94cc4c,0x7ff90e94cc583⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,15087154488048250037,7651234765036322231,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1872 /prefetch:23⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,15087154488048250037,7651234765036322231,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2200 /prefetch:33⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,15087154488048250037,7651234765036322231,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2408 /prefetch:83⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,15087154488048250037,7651234765036322231,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,15087154488048250037,7651234765036322231,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:13⤵PID:5108
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵PID:1148
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2268
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3954055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
192B
MD5d0fa7f57ec0a444d7dea60d28424602a
SHA1a845b1f546dfa6f5a71c0134f931170f679ac1bc
SHA2569cd9b523349b115f6e55638de4100dd14966d9e6a57f07e1453028956e5de4e4
SHA512c2470f820ccfdc7bce3032ecf347a8e02cd483bb957c5d1025f8bd37386d4e011c0f9de13c38f21725366aa04d03adf609e950a564c4220ed9e8c8b44a065dc4
-
Filesize
2KB
MD54a10120c1e801fdc12d1def2c3598ba2
SHA10c3d36226d5782d683e24df08ab9653ae4432dff
SHA25661179e72d6010de5fa7913688e2bca563359f2332c6b6871dbc501c3eb1c4883
SHA512775425a11be40c396e638e6d25b5cb7023da72d9b171628c53ed7583fb255ad490520bbec6db557a155c2b3aa47324c90e9337b38f3bf58ae400243d0cc3a86c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5f8cf370c511198ed3b355def89912f9e
SHA1818af770c5f682ec140a51e1612800b77aae088e
SHA2569b63e686e7865944a58ab59aaecdc5586763da900175f10d395212a893d4acba
SHA512ceee31a9daa275ba7d219235a2986e76f02f9a9393648b43dcb5088916bee9a6102948a8180ee41c891c4a696805db09e9937870568364b8e4a37d547ef362d1
-
Filesize
99KB
MD5a237ff05a5d75aa9d5eb361c80266171
SHA1ed5a869bfe6b3563566268c3ff4608b28af41447
SHA256c0c9afdb9ec8cc2492b6f20ba38c15268e56326bf6d93f5b251d45962dc5fc73
SHA512bc35efd41738a453da642d6c32254eceb8c92abf06628dc26a16f86f202d3f42ebcf1c2eef0085ad61949b53e1d1c1031d2699641dd2a908ead90754709a9386
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58