Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
ConsoleApp5.exe
Resource
win10v2004-20240802-en
General
-
Target
ConsoleApp5.exe
-
Size
11KB
-
MD5
ec2ab4b17f0a8530416f5a45d4d563d6
-
SHA1
32e8612c28e0c9249d8acc3a5e204aab2a08f8fc
-
SHA256
540a758f387fee0a792f1c52cd04e2f356e72cbce6c7313fb376a222dd0bae3b
-
SHA512
f24dabd46d92dbc157c6788cfb176b56cf01b025e6f16e836c1e281f5cc294afca287c42ec1aedf6b396410e0fb2d29046ee1d3c2de0b5df926d3edf71b6a82d
-
SSDEEP
192:uFHE2y0jMbj/eSwNJ+doZni5n8fyYsCMU4GEQH9vzE:+y0jM/DB8i58qYt0tg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ConsoleApp5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConsoleApp5.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "198" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 3836 shutdown.exe Token: SeRemoteShutdownPrivilege 3836 shutdown.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1176 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4956 4112 ConsoleApp5.exe 92 PID 4112 wrote to memory of 4956 4112 ConsoleApp5.exe 92 PID 4956 wrote to memory of 3140 4956 chrome.exe 93 PID 4956 wrote to memory of 3140 4956 chrome.exe 93 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 3928 4956 chrome.exe 95 PID 4956 wrote to memory of 1184 4956 chrome.exe 96 PID 4956 wrote to memory of 1184 4956 chrome.exe 96 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97 PID 4956 wrote to memory of 1292 4956 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ConsoleApp5.exe"C:\Users\Admin\AppData\Local\Temp\ConsoleApp5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.google.com2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x84,0x104,0x7ffab0eccc40,0x7ffab0eccc4c,0x7ffab0eccc583⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,1570564201641585776,12704925966172060617,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1948 /prefetch:23⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,1570564201641585776,12704925966172060617,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:33⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,1570564201641585776,12704925966172060617,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2564 /prefetch:83⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,1570564201641585776,12704925966172060617,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3164 /prefetch:13⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,1570564201641585776,12704925966172060617,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:3392
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵PID:1260
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:684
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa394e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD582e06b2bd5dd8987fffc4aa17867148f
SHA1a521308299312ae1adc9d02418a70238115be2fc
SHA256d827fa9cf3ce671c45d3d54c3b63ac3a7a7ed23585dea25c7fd42f1ad793972f
SHA512c533bb7c283f85933139f1cd05e46ab583f460951c0dddc61d0452abd5726c4ea8e7419ff729806f13aabbcd016bb41300311c0c7fc6032a7a97cae0aa4d83ea
-
Filesize
1KB
MD55159752bc21a37c37c0a896fc1299662
SHA130838047a6ea6d434006cb3b14f41029932629f3
SHA256107d2a27b6eca44d493cf4964347d25f1c1080ccb1bb2dacb7760b94618a4f89
SHA512d838d4a6416e737533264269322914858ad46f44142043fbdc9e3f1924f1aaeb05bb2f10a32af4281512d7b24ae9ffbf2080345ce396c20da73305bea6f94c68
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD598783a667f894a4ee275d69cd903e74b
SHA143ee24630a550e947aff47eab022e8229f002f1d
SHA2561668fb21adae654e1977a1df29fda448e8b14f46fc35fbc443c5e3ccda45e83c
SHA512c7bdcf9113097850415c5c8bf7007edfae98aef10077f5ae1eaccd0b5f98a9e6cb73b3100857943e43823c984b3acbeadd0fa7d1998d17c6da6515cc9ca6fe08
-
Filesize
99KB
MD5af225cbec6f3aeba81be67eb37fee6b9
SHA19085412f76d5a3d594bd7db1cdd2fb169121b631
SHA2564024b9c08de00dd5a90ee291c91fa37639ef90d3a79f0cd03d5edfa4c85ccff5
SHA512bea2d7199b41e20f5fbc39efd3791cf0095208ab49da406a23aad377bef8ee35c4cbb4bc519577a9bc580182f4865c15420e7fb4bfa664551f317df554c7b5c6
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58