Resubmissions

22-08-2024 18:18

240822-wxl39atcnl 10

22-08-2024 11:13

240822-nbt8qswgqj 10

Analysis

  • max time kernel
    1799s
  • max time network
    1706s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-08-2024 18:18

General

  • Target

    ef3551aae96f3756275e977c313b915120660a4c3c23390fb9a3a4b836989c2e.exe

  • Size

    564KB

  • MD5

    0b5d25a78e3930329645177f916c635e

  • SHA1

    657354750be2feb546a9142253d7ee9045343791

  • SHA256

    ef3551aae96f3756275e977c313b915120660a4c3c23390fb9a3a4b836989c2e

  • SHA512

    044a878e12cd3c3107de27ab8ca90a0db859c7d24f4c6d2c895f1910fe407837092c5dee3599799d77a52d58470f1e54b9aeaa59e9510810b78036d5c94047dd

  • SSDEEP

    12288:hWkYoL3rlW475lzzSb+ZRAvtIYzkUm/anGT6rLS/F68Yf9o70A67kR:fLvJoqnAvtJoUmCnG/hYfS70Av

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef3551aae96f3756275e977c313b915120660a4c3c23390fb9a3a4b836989c2e.exe
    "C:\Users\Admin\AppData\Local\Temp\ef3551aae96f3756275e977c313b915120660a4c3c23390fb9a3a4b836989c2e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3208
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcb0c49758,0x7ffcb0c49768,0x7ffcb0c49778
      2⤵
        PID:748
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:2
        2⤵
          PID:4116
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:8
          2⤵
            PID:4448
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:8
            2⤵
              PID:5096
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:1
              2⤵
                PID:1768
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:1
                2⤵
                  PID:4736
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:1
                  2⤵
                    PID:3440
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:8
                    2⤵
                      PID:168
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:8
                      2⤵
                        PID:4812
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5056 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:1
                        2⤵
                          PID:4844
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:8
                          2⤵
                            PID:684
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:8
                            2⤵
                              PID:2740
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 --field-trial-handle=1768,i,8883808793311946265,11131866647542690573,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:68
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:480

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000004

                              Filesize

                              212KB

                              MD5

                              2257803a7e34c3abd90ec6d41fd76a5a

                              SHA1

                              f7a32e6635d8513f74bd225f55d867ea56ae4803

                              SHA256

                              af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174

                              SHA512

                              e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              168B

                              MD5

                              5c9e0a7784fd553ac2933fbb80b2fb6b

                              SHA1

                              271f73d11cb9342584cbdefcaa6404813330971f

                              SHA256

                              181855ad711ea6562eaf5ac17b76c1f662e00d1eb0f267464f8fd95726ca316e

                              SHA512

                              c2f05f266e4fa2d4cfcabbce2ed7d79cb708e638c6d5d98d6ca10881f83dce78cf194411ed5480abb11d84eee1e333172e6a6ecae6bd9a725c6b5e81ace746b8

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              378ab6cf3be8bf1521f7b4bb259c450a

                              SHA1

                              349935744ab7a43061fe777b99b424521e428b44

                              SHA256

                              37d9c930f39b9fc35e8d50d7b83ccd7464d865ef40dd7c3707abcc564f6c84fe

                              SHA512

                              24300f910e61a198b15a4e705cbe4f56b09679569201968436dc05e72a7cf42374e87aeace8ca5ecfdb88fff9bda9d4aa7902099445efe130f9c090e17765682

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              b881726af7bb31a5d1a75fb9a1638341

                              SHA1

                              8145e4d4af60ece62e330d662f6077fb6396b0c6

                              SHA256

                              bd7a8bf990421a547d1bf7e3bd6539caddbe23f26e06695f25d92216a7034440

                              SHA512

                              124d1a5b3c0a3f5e2a0888867124767d15ad551887bcde4cfa38b7af6be0c714b3e7184eff7a450b6dac59d90a8852458e5700ea4fa9937ed5ad13794614c638

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              873B

                              MD5

                              b298801b8b47dd62e865bbb195283e99

                              SHA1

                              33b6e1ac5000d06be1489cf395a4b56d79705e6c

                              SHA256

                              c7d5d7c81799982a9a234ddde7a6b6a44db9a2c6e69abe19d11e216aae2a484f

                              SHA512

                              b1cd1674b8495a2b1e7c3b83e422977a5791fcbfddee8f17c13756ef42bb6b4cb389febd59d3f810fd0349d614d8d73a1676913dd1ec359b7f39e47b6b0a87af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              d84cec05446bd47d14f3d70f2f57af6f

                              SHA1

                              fa4d11d57b45d69468090d5eaafaa916af2c4468

                              SHA256

                              76a2eee2178e5ee52264e4f718bfb98c6ab3f8d6bf4a0e6a3bf61b3a2cc9e472

                              SHA512

                              567187f157fa666eebb7e84845eccf26e34e2e92fbd7794383187ce64172ca090da904d13017598dba1fa7a0a771f428b619dd400e185641f56b44e722eaf13a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              204B

                              MD5

                              8a317fba543f59f08c62d10e44d644d0

                              SHA1

                              89e21655ba8c207ad63fc2c107bcf4876d512914

                              SHA256

                              982ae0fd1b28ee462160cff926fe81f5b43c3bcffb5f0f849d4746632815a7aa

                              SHA512

                              638262babcd61435415e16d15c914392f6de17c10b0b313bf2f7bfa3630f396eb5730b399e7358e3c2742b3cd80998b08ded98ff4f1cfc595cb16e1ce0d9636d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              4ba2b348b95d6446a6240ea84a9529e1

                              SHA1

                              74ceaa201a0902c284f73693faf2b4078a494c04

                              SHA256

                              7ec8cbb7469e3622958d6a4398b3823bcc20c01c0917055b23b37dd003cc6a91

                              SHA512

                              63a7990295c1ca8bbef1f187c99f1dc177f6ef682b28a782f3fdbf01264d2c7bf3cef0dab37ee3c7d748043ddce1e7cad827605c309be54ac9136cbe84dce158

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              781981533ab0e383e8baacab22f26c68

                              SHA1

                              3993518c75f1c03dcb40f5146449aada46960c9e

                              SHA256

                              bc94e1e9d5a1eb2c686963962591e8ea9f0443e7e0f7e85c7cc47e1fbe0dabf0

                              SHA512

                              321c3e874ebde236beb15a9eb685947f5e7da297f6347d596c10b8ca2fde13247e874f182c7bea05adfa97f38e38061fe789c5e4b988b4081b873b8c2b189f65

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              4c293f0d4110baac457c628435800097

                              SHA1

                              c6ac3b93a470402cfdd1f3a794d1ff35dc6bb40b

                              SHA256

                              03f524ba183db2a5bf072dada12cd50065e8e905fd5c76f48b94cc26c20f4614

                              SHA512

                              6aebe78771a10302c7a5733ade12ea782199fe215de93536a5d36fe4ea4e47554a95f133148621dc28c2549cf8dca2ee399041e272c0da90579842d9109209a6

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              6eaec69f0b10a481995c6553f1b71dac

                              SHA1

                              b86f5f3093c38b39e9897a579f7a9fe4c1ed8e04

                              SHA256

                              fbe1aaf0ef8033cbd9e31e6ecb2c66b88964b102636352af706c2007e730c32e

                              SHA512

                              a8bd702b2d0ada8a0d87d5a26c72cca8c3bc03abc1cb8c9abca6495c68268627cecd3ecb661d5df2a45b7835f4d92c6b40276a3bdd3da8689469ee6bb1f631a6

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              313KB

                              MD5

                              65e8a40e061130e88be1c54fc68fc57d

                              SHA1

                              d7eb8190cd4ef285355cecd3797d59f93ffba313

                              SHA256

                              31f77b073445a014b237bf7c9e6442d7d938b776b30b8bc63a1293516c50b0da

                              SHA512

                              ab880ccabb3eff02147ffef1b31b35026324925a6e9d395bc9deaa0882946edfa7cc9e6107302e9c39e2e4e23edd23db925ac98d8f02e0d0802ce72889dc3205

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              150KB

                              MD5

                              f321b922933506e97d4fe79282dc5cbe

                              SHA1

                              61470a9b082f61e3c09d3b266197845423fdf29f

                              SHA256

                              58f2a3911ac9a94c3a8fa253d6ed741be2740dc6b4e6c95d2e3edb1cbb22999f

                              SHA512

                              42e8999ec299007743beffebbc5fd6085d9da5e4d3b7eba9d505d31a7ce706edce0ca087945f9578b474e48a6581e50a067f6baf12c05b02dcc2481c9b1328bc

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              369KB

                              MD5

                              e57b51402e1dca2675dea13a796c4bbb

                              SHA1

                              18ecd57e71efe509e1e6495aae09fd3d9dca6113

                              SHA256

                              805e992610a3d9cf8ae0da91f98e5242eb47d734b092d1d81476e8ce4b2effbe

                              SHA512

                              4f7fbb98fd3bea39199a081cd8e1bdee0981f1a28e7f383fc6d157c46617cebe5f795cb5d5c9b6765ae91a36d7e4540e9ba2aec8613358619e719b640127b9ff

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              313KB

                              MD5

                              6e16df7345c0a851762d931816d3fb6a

                              SHA1

                              40a550476cd1922f0b950a597353dda0c4a2c75a

                              SHA256

                              f5170ac14786f79bb50353db8e775854c0c94c3e19a7d00e25ff4a09a13c7064

                              SHA512

                              8504d3306e61d863fde7d087994e8fd3e057144b76d3e264e9362d2a2ca348b9442731f853910b7467febce6b5483748dc810f9d326481de12b788b4f14d36a9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • memory/3208-12-0x0000000007930000-0x0000000007992000-memory.dmp

                              Filesize

                              392KB

                            • memory/3208-11-0x0000000005470000-0x0000000005480000-memory.dmp

                              Filesize

                              64KB

                            • memory/3208-10-0x0000000005350000-0x000000000535C000-memory.dmp

                              Filesize

                              48KB

                            • memory/3208-9-0x0000000073ED0000-0x00000000745BE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/3208-8-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/3208-7-0x0000000005280000-0x000000000529A000-memory.dmp

                              Filesize

                              104KB

                            • memory/3208-6-0x00000000052B0000-0x000000000534C000-memory.dmp

                              Filesize

                              624KB

                            • memory/3208-4-0x0000000004FC0000-0x0000000004FCA000-memory.dmp

                              Filesize

                              40KB

                            • memory/3208-0-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/3208-5-0x0000000073ED0000-0x00000000745BE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/3208-3-0x0000000005020000-0x00000000050B2000-memory.dmp

                              Filesize

                              584KB

                            • memory/3208-2-0x0000000005480000-0x000000000597E000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/3208-1-0x00000000006D0000-0x0000000000760000-memory.dmp

                              Filesize

                              576KB