Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-08-2024 23:10

General

  • Target

    https://cdn.discordapp.com/attachments/1278471976515665950/1278854393587830816/Fatality_2.rar?ex=66d25177&is=66d0fff7&hm=cf40e8d2989c9673e34c55d83864b3e672283f7343b4b8a2a9c9db73af3fa055&

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1278471976515665950/1278854393587830816/Fatality_2.rar?ex=66d25177&is=66d0fff7&hm=cf40e8d2989c9673e34c55d83864b3e672283f7343b4b8a2a9c9db73af3fa055&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9298f9758,0x7ff9298f9768,0x7ff9298f9778
      2⤵
        PID:4832
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:2
        2⤵
          PID:672
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
          2⤵
            PID:2064
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
            2⤵
              PID:5084
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:1
              2⤵
                PID:4512
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:1
                2⤵
                  PID:3096
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
                  2⤵
                    PID:4996
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
                    2⤵
                      PID:4612
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
                      2⤵
                        PID:4740
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
                        2⤵
                          PID:2700
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:8
                          2⤵
                            PID:3176
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3636 --field-trial-handle=1584,i,7504775277830311365,760457757911152261,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4620
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3116

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            449B

                            MD5

                            f91280252bf61ee3f6b9199e39af8e51

                            SHA1

                            480a90b66993095301bffeab6bbe693bc2512ebd

                            SHA256

                            e8f2bd6f7ec7b844b8b12faf35f493e7f969c6b33c2b8772187839f7b4c4368d

                            SHA512

                            dacdd17a5bc2d24ea6d0bf0487a4e654bcbb5f56b8a5906a6b28ffebeec1a47c391b8e96e0eb34eb103145864890ea83e73ece5f82cbaa42ea75c76f28db0216

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            29effab13e7a77b0fc877355a04769ae

                            SHA1

                            5f6438781392649dc156b56a2176356d1ee4ea12

                            SHA256

                            ece5d28270df6eb73e9f2079e4fc7e54fdbb276a5603d7e58a72ecfb4a410aa4

                            SHA512

                            54818b432e223818eaf000fa6cb7e88e32888b3e852c037667844e1b4930f7623a3d4835a6ebac6c6ce3ba27f38621c8daa0824231a125e723c0c6bf90ff7f67

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            16d86f08a573d4cf9f4c686a6b27e384

                            SHA1

                            aa17a6d7b61edf3716d912525a0029986d6cf808

                            SHA256

                            6fad0d123f18ef2e11c867eb06f665c368bfffb11b7809e3f61e0b869563207c

                            SHA512

                            3789c5707c2f164ade81eddd71d9f57c077154910685668a936ead48200c581f44467133ea5ea457db187179f5821a77ab761ca9a18a6b13a42cc62e44cb994e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            d2403798b8a3ff1dcc27a98185d402cd

                            SHA1

                            f809ec8b04d01094d4755196c09fa1f6c3dbce7d

                            SHA256

                            63f94036c27de57cf884281bdd53c94776be8d65be39362156f0d3169e88bfe2

                            SHA512

                            b8bf1306635e7058837f4c862f87695a9910460c7a94068d67f90b59ab756bcc667d4111a9f5ed522dc5d5cd4cf63d5c056f355dc625883564603d3114774527

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            150KB

                            MD5

                            b543af0ec66900d1e7b052ed82303a82

                            SHA1

                            2b21ee4420784d0320ce7f0134769a7c42315a72

                            SHA256

                            f08c7c7e074157a46b8133dabe231aefa56241bc416f1f035524558930a37471

                            SHA512

                            cabb83fb4f93e0aa06ebb4df1c8f7dd77bb40a5bbe11eea76faf4f0622678e2441d0848bdf1eda7b0d7ccaa3e4f1749b0c8940d44715361d7dd7d785f121f0d5

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            150KB

                            MD5

                            611983e57490be26ca40b961223edef0

                            SHA1

                            49e2e6d93463d06fcd514222a362b9c5d4ab5ba0

                            SHA256

                            b62f4d79d65fe2029f77001846ca1c020d5490536e6735ac9266dc70eb5712d0

                            SHA512

                            c7b902b475be75e4c320f96d68f03f83007d18b617308b3763275e6c76bf8cd76526c64ca49ba72e8e1fb3bd747489752714a274c332477e6578cf2791df09f8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            150KB

                            MD5

                            ab1d7699cebada5a7a9b297b2fae5320

                            SHA1

                            ca2fefb6da28592046063a856ba57de7875eac15

                            SHA256

                            ea27a41b8bf6b91a9b4033d3e4794d047ca5c91d97334b140d1dfa4f5893f864

                            SHA512

                            737bd8d309c9c3f704a64df6e592d5853cd36d7c2481e6295bcb6790588271d6cc547501c6483281869562067787bcde39c155c9df1ad519f3356528ebf5bb4b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            167KB

                            MD5

                            97f1fca72a64cd95446642bd5209f219

                            SHA1

                            769c3ec6833446cf68047e6ce8944faf15f9e09a

                            SHA256

                            06b5b6033dcc8b7ccf6a4157af744bfa16d95abbf229bb4fbb7bdd429a41928c

                            SHA512

                            ce7c6a780a3296ac8948c951adaf6452ae6aa5c2521ff2d0519b9ee4d82f434454a4850a7e743b95c14f35a6fd85a2c26c6446e07e4f036e8b6f023319840e37

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                          • C:\Users\Admin\Downloads\Fatality_2.rar.crdownload

                            Filesize

                            9.7MB

                            MD5

                            8d644b7336981e58669064baedde217b

                            SHA1

                            99ac8caf3daabf500a6f324e4ca8224cf68268f2

                            SHA256

                            02a7590ab5032fb9131567336dd2cba1dc4cf5dc21b4c68cabde8b7f570ec78f

                            SHA512

                            95b38bbbc9a478c3e4daf2d8396447af0458740f1f69409af35f7a21ff56bdab8f9b09118fe4474380f26b0d070f2732315477af9b3fe7ab113b030777dd4098

                          • \??\pipe\crashpad_2536_PJZPFFAAIDSRZKOK

                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e