Resubmissions

09/09/2024, 05:29

240909-f64fwstekk 3

29/08/2024, 20:53

240829-zpfs2s1cnc 5

29/08/2024, 20:50

240829-zmrgrs1bph 4

27/08/2024, 02:48

240827-dakmss1clk 9

27/08/2024, 02:45

240827-c8wbhs1bln 4

17/08/2024, 06:59

240817-hr7k4ssgmc 9

17/08/2024, 06:56

240817-hqdlmssfqc 3

17/08/2024, 06:55

240817-hpszyasfnd 1

17/08/2024, 06:53

240817-hnwdnswcjr 4

Analysis

  • max time kernel
    58s
  • max time network
    59s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/08/2024, 06:53

General

  • Target

    https://adultdating123new.blogspot.com/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://adultdating123new.blogspot.com/
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd025acc40,0x7ffd025acc4c,0x7ffd025acc58
      2⤵
        PID:4252
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1776 /prefetch:2
        2⤵
          PID:3316
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2068,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2084 /prefetch:3
          2⤵
            PID:1120
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2164 /prefetch:8
            2⤵
              PID:1040
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3120 /prefetch:1
              2⤵
                PID:2984
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3156 /prefetch:1
                2⤵
                  PID:1064
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4376,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4404 /prefetch:1
                  2⤵
                    PID:4516
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4388,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4580 /prefetch:1
                    2⤵
                      PID:3056
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4544,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4260 /prefetch:1
                      2⤵
                        PID:1184
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4564,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4392 /prefetch:8
                        2⤵
                          PID:2320
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5036,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4452 /prefetch:1
                          2⤵
                            PID:5008
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5116,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4556 /prefetch:1
                            2⤵
                              PID:1988
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3376,i,18423257950679006731,9387993184706540200,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4312 /prefetch:1
                              2⤵
                                PID:1028
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:4840
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                1⤵
                                  PID:4584
                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2148

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\972eb5db-4f82-4f56-8ab8-fdfd31921719.tmp

                                  Filesize

                                  10KB

                                  MD5

                                  12a9f77e0856c2ec835c80e973b7580c

                                  SHA1

                                  c4e86ff2e6108c2924c864798b00e4269202359f

                                  SHA256

                                  fcef27699692f05e286d289befe2c916fa06a0036355b9fe9762bfcc927ac69d

                                  SHA512

                                  3777134f3500b282ae2f2e76dd3ff05a271abb6291820d6e7239e6fcb7a215c16552b26b9e95eca2f67c103c33b46b885fafce6baae5db66cf15cd6660fa4530

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  649B

                                  MD5

                                  937cb9d64d4f9d2e34e135ddb88062be

                                  SHA1

                                  6286e3844a9e3505f8eee6725ac31e79d627e93c

                                  SHA256

                                  daa9c6856b77e818c36ce0eb4cd000418e910d5204fca2499c5dd9d653d07b68

                                  SHA512

                                  384927f34977bdf5d2ee2e13fb414c2a7ae0bf5adaacd80c36a26d8075c085bbf36ea70e01304515cea75dfcf15aa63d5034bfef70ca0f57a0effe843bc9a663

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  528B

                                  MD5

                                  008ae35185db050570aec6f7f11feb10

                                  SHA1

                                  2f12b84e61cbd1e9766d408bf28c6fb73d87d578

                                  SHA256

                                  3feaed6791d92d875446199208995868e18f712b62d5bdddb8305478659384b5

                                  SHA512

                                  4f01638fb01f1d79faca2ab5cf8d6585eda1a2c5c2f8b50a0f05e58c1f5e88d80717b6e20a67d0e194d8cfb27c94c604e33fbdc7b5a2def738691facf9393c7e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  859B

                                  MD5

                                  816e857ffeffa1ef6211bf25cb781302

                                  SHA1

                                  d15e4d5f496cdf6545cff55ee50bc7023fbfca95

                                  SHA256

                                  c1cd8bddbcbddf7977331312125bcfd347addaac574f4271fbd25dfbaebe20fc

                                  SHA512

                                  dd53166a0cb084a641f3bf4dc25996766453b0fa977b979dc746f1474b3f450ce5213569e5a75c8dac03599c6edfef9226fe1798142ccdc3743efe014ea5b433

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  4df85c3d989612710ce414a6604ba1f9

                                  SHA1

                                  69268d32c79ac84b77207ec692463788c7220716

                                  SHA256

                                  efbba4aeeca8b6521931694ad8228fc9c8603f145fe97fd6f0b63e3f7afb4756

                                  SHA512

                                  f182d30c55710b0631dda0e3bce9cfdc05792998b5462364b7cdc5f257da8494cd87f845a626cc16f51c532842c09edef5b50a5075968f34c21e456400af6a0a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  3567fce00f898b4fe49555cdb49f99ba

                                  SHA1

                                  c2994f3a970b6675c851a880414c0e0333973c7c

                                  SHA256

                                  122a2dbe574ad6b08b4949a88fb638d493080f2dcba7dd2cf6d9ef74dc8e92ca

                                  SHA512

                                  f5551a1984bcea65f049fabc04df9f2ed18d12eb007530379baad14a478146db0149b763028315e63529f98abfc8a9c1c0647a671ac572b4c88362361a86e6f9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  fe8cef667c46b1e6f30b3e50a5c97769

                                  SHA1

                                  ac4ce55c37c25f93a96150e04304a030c50c3433

                                  SHA256

                                  91781cf347ab7a1fb81958d7ae7bb80a7334e59f700dd6241859a535ce5005ca

                                  SHA512

                                  368a36ef784b96e778b4c648983c57ff7ef85a7ec10b8901213e7b7d3b99b6222f8787e20d5b078171f20bb105cc99f4a396f609aaf56ff23c6932275d78aae4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  04ede8ff155e8bfa4e0e9617c486bd01

                                  SHA1

                                  812a2826200c1eead52ee00af52f41894bcd2ba7

                                  SHA256

                                  bf395ceeb25c560098127e26923ae098921d1713397fe77af242e89ec3644e96

                                  SHA512

                                  64b230b7641783e08155d69db7c85f22540790fe644d5243e8d2352bbf74920bcf3c518edd1af44578bf4b0a0466f1d0055eb49d5359a162baf41de231548b3f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  195KB

                                  MD5

                                  a13c50b5730e0d8c705ca46728fe6809

                                  SHA1

                                  5aa60db41cb8b68c656789eb39251b444ccb4c3d

                                  SHA256

                                  4872530b2fb13a777ec182d503a6f6eec092de9ac578bee6f23341ad512ccd94

                                  SHA512

                                  1ecfbe0509c538a713c2eacdb6aaf1da54febd479335b353322f9fedc77d709ef9da130fcba9017cbf723b3ccf01fa69122beeaaed514a3360c42368df8b18be

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\b68f2b0e-ba9a-4a40-8a27-ae62cdb69c6b.tmp

                                  Filesize

                                  195KB

                                  MD5

                                  1ae8462d4442fccfbfdeaf75fad5cb1d

                                  SHA1

                                  bf766db26af7eeb06d16058f0a18e02798d140cf

                                  SHA256

                                  6815d5aa0bb75b977d8e0bd522adc3f6b2fb948e71ccae85cd0d60e55025f95b

                                  SHA512

                                  2ca1fe53f464e0ccd6cac0b088614792d76c7ef3fbeea9116aecccd1b6aa52958d0a1a76ccb9ea6706e48cca332dd15808776657f28d035bbef95f73a1f5a066

                                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                  Filesize

                                  10KB

                                  MD5

                                  41ce6cd728e8893a0387cd1d5aaf201d

                                  SHA1

                                  c6c5257c73d52968b03fa7a332f61f050229999c

                                  SHA256

                                  c6ff6212cd4c01ff44605a8339568c3ed2b9dd85c7956873ee9db592e24b654d

                                  SHA512

                                  73c40effe3fa0c521cdd5347e85ac142666a5a7b982d96c80f4c08c079d2f5a8d58c12644af20f27b8480040eb74b28d0696be16fc9566c02bf2d60d08839c27