Analysis

  • max time kernel
    138s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-09-2024 04:18

General

  • Target

    https://href.li/?https://cdn.discordapp.com/attachments/1280286920340934691/1280422999476142090/Latest_SetUP_free_-9192_PASw0rdoPen.zip?ex=66d80658&is=66d6b4d8&hm=985ca4a85190231b4ab20579429bb4c29a805534e53535bc46cfb8aba684a4eb&

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://href.li/?https://cdn.discordapp.com/attachments/1280286920340934691/1280422999476142090/Latest_SetUP_free_-9192_PASw0rdoPen.zip?ex=66d80658&is=66d6b4d8&hm=985ca4a85190231b4ab20579429bb4c29a805534e53535bc46cfb8aba684a4eb&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff16079758,0x7fff16079768,0x7fff16079778
      2⤵
        PID:4688
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:2
        2⤵
          PID:716
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1752 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:8
          2⤵
            PID:236
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:8
            2⤵
              PID:920
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:1
              2⤵
                PID:2656
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:1
                2⤵
                  PID:508
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:1
                  2⤵
                    PID:1852
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:8
                    2⤵
                      PID:2748
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:8
                      2⤵
                        PID:3488
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:8
                        2⤵
                          PID:2136
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1824,i,17470545573362186248,6416446221528526330,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4676
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3868
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:1952
                          • C:\Program Files\7-Zip\7zG.exe
                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\" -spe -an -ai#7zMap20806:132:7zEvent14038
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:392
                          • C:\Program Files\7-Zip\7zG.exe
                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\" -an -ai#7zMap23142:340:7zEvent19439
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:1088
                          • C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe
                            "C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe"
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1964
                          • C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe
                            "C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe"
                            1⤵
                            • Executes dropped EXE
                            PID:2132
                          • C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe
                            "C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe"
                            1⤵
                            • Executes dropped EXE
                            PID:756

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            2a029b1d25b68f22b0fb7ae3e16371bb

                            SHA1

                            eb32028a92e0be140c941556fe8495d75dab44f6

                            SHA256

                            318de5bfe353c379244c40e8de9927c112d4fe48dba073d5aafecad39257b304

                            SHA512

                            d049c29f3e08d8390a3c0e9b6baef3ac88b595e2f03995f0592b423c07ac47f32905ed065377101df043c6993739fd72cb58141b1bef7d98b22b564565b40d63

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            537B

                            MD5

                            b91e7c572c37c8d9bc2aa2ce6dc49bf8

                            SHA1

                            fb669201c9e6c7f81f0ea9bdb9262dbec905c5b5

                            SHA256

                            1d391423702a49c72e24ae06a6eab88f9de0852475c579cf476645e9b553b776

                            SHA512

                            2ef660471c787ffff0a40c3ca69893c29c7a60cdc99049093028017b32a7cf5cbc60fc7c3d75668625a86e475ef6432812c98629e6483a6992e6a8085e08afa0

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            557b249125984573a6cbc42fbcf86996

                            SHA1

                            ec7c8f810404033ceb88dad35f42f6343b66af53

                            SHA256

                            a52c181ed01aa7bc0c4716891fbbf88c400dbca033dc157123ceb42371b52d4a

                            SHA512

                            b3bb13f39ef91d4364e7e03881d9ed2a4c44a63c5d02ea6088774b2332ddf5a51b7e6971db43287a63d747862d605621b3705d0410e15c0bb751b0ab2c09bce7

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            91f967f1bae93fbd29839a11e54f098e

                            SHA1

                            650c636c91139951c6ddc664e4bd2111647f659f

                            SHA256

                            7ea6a9a66d6b80605981c431e359d1dc401d1f54414b73706e305aa82f57ffff

                            SHA512

                            016a33b9605d31ded5c6df20d91c03f1806874ae60c78be152394f97dfeca6ee3b20039f8585a635cc83702a9782d08d27163f8440f9e1142c0832e375745f9b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            138KB

                            MD5

                            a66336ea1199b797abfa36e8943cfd79

                            SHA1

                            d4046f29accc4c60abd8eb4ecd915d142d88900a

                            SHA256

                            6ef99a12d20fabb97e806767478428bbd9f14795abd7cc942c60b5df9adcfcf5

                            SHA512

                            c3b68e961b282ee4c6fc4cb98f32153d2e461866fe12fa60e5d9954ea37f7257018ddc8d723328fe923ca024685e279a4173159ea36ab370c13cd8c98aad18a4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            137KB

                            MD5

                            bb2a5ed0ec7dc63012d6d736807a919c

                            SHA1

                            ae8969c7a8efd073befeac27581bbd9700404a43

                            SHA256

                            9852b44310e9e67e738fe570ad2ff8d7ed78908d43d9a5e2cb8d1baa554371d0

                            SHA512

                            7c4f8ff3e855444ede20f90a4b27726433b5d4c38059a76fba8410663364e58f9c275152030b8051e1331af33a37431e27495b11be22d17009d2c593964ded81

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            137KB

                            MD5

                            5d890d6f7e7ab9d5ddc2e52aaa9810dc

                            SHA1

                            34f5d01502077f89cb5fd719c0e2f829ae3f25c3

                            SHA256

                            e7312a8a75a8abe3578394a7e9333e068d235ebe88aeceb03d33f89322b123c5

                            SHA512

                            89652bec14c846d4dbea6fd3a71eb218b787010579e4b583ad22836a4431ae75774d1b483d2d7519a62bf434ef2f8a5c1ea3f77033368dc9e5eead32ec5461ee

                          • C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen.zip.crdownload

                            Filesize

                            20.2MB

                            MD5

                            521b88be53c89ab5d78ad274688e43e4

                            SHA1

                            11564dbb4e0e73f08b113e2f52a4450ba2038658

                            SHA256

                            9c82d91efb3544252e563d1ee1ee76297b8b5b83c817ed00cf582dbd0541357e

                            SHA512

                            e3b141bc13ffa63e716df5b21247c563bc487670f3f03c2b5dd812149558830ca43adbe2aba4ea26dfff1775c367fd931081c4936e920cf9f5713b8e4e6c538b

                          • C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#.rar

                            Filesize

                            20.2MB

                            MD5

                            af4de9ced953a9a9460f3150d8d222ec

                            SHA1

                            eaee9401a7d87cdaeca905bc9ad463e32c0af8c1

                            SHA256

                            2dc01231614c0051d2c9c724c487af79ddd7caf7744b2a93cc75c3e32271d9fa

                            SHA512

                            e22cd02b2f313849b9ef7a4f1e03fa9a1829e15f3b24cfed95c7ea436973da43c9bb6469cf60f6b6366c07eff5d22b9a81dd7bd4cf61ee3805a8f67c0dac6841

                          • C:\Users\Admin\Downloads\Latest_SetUP_free_-9192_PASw0rdoPen\#!~Latest_SetUP_free_-#~9192~#_~PA$Sw0rd$$~!oPen~!#\Setup.exe

                            Filesize

                            6.3MB

                            MD5

                            c87c0c2331cd4b8b92a799552261df1e

                            SHA1

                            3dda04fa021ea4d8ebc8bfa68f856bdbcd0d91d3

                            SHA256

                            1eaa372dd5cf479e5c1aa20f60888b83ab879bd6a108ab2a4b930c6a00ebd111

                            SHA512

                            530689d12db499df4f07e15c5d6ce24891fc6eaae450e2b548833782e8649cd32209c377f1fb7ecd1b68426d260f9cc091c1f6f7a99117dac1d566ac69c06747

                          • memory/756-339-0x0000000000400000-0x0000000001068000-memory.dmp

                            Filesize

                            12.4MB

                          • memory/1964-334-0x0000000000400000-0x0000000001068000-memory.dmp

                            Filesize

                            12.4MB

                          • memory/2132-337-0x0000000000400000-0x0000000001068000-memory.dmp

                            Filesize

                            12.4MB