Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 08:40

General

  • Target

    HxD.exe

  • Size

    6.6MB

  • MD5

    14fca45f383b3de689d38f45c283f71f

  • SHA1

    5cb16e51c3bb3c63613ffd6d77505db7c5aa4ed6

  • SHA256

    9d460040a454deeb3fe69300fe6b9017350e1efcb1f52f7f14a4702d96cb45ca

  • SHA512

    0014192bd5f0eb8b2cd80042937ccc0228ff19123b10ee938e3b72a080e3f8d3d215f62b68810d4e06b5fad8322d0327dcd17d0a29fd0db570c0cd7da825634c

  • SSDEEP

    49152:5mDRStjz/gq75Y5vws3spCSryzWXTXrCHIz8r7hPVL3FpwVfJkTKljfjZ:YKNzzzAtF0JXlrjZ

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HxD.exe
    "C:\Users\Admin\AppData\Local\Temp\HxD.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\HxD.exe
      C:\Users\Admin\AppData\Local\Temp\HxD.exe /chooselang
      2⤵
        PID:2748
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef64b9758,0x7fef64b9768,0x7fef64b9778
        2⤵
          PID:2476
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:2
          2⤵
            PID:2148
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:8
            2⤵
              PID:2660
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:8
              2⤵
                PID:2944
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:1
                2⤵
                  PID:1268
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:1
                  2⤵
                    PID:108
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1228 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:2
                    2⤵
                      PID:1992
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1312 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:1
                      2⤵
                        PID:448
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1224,i,13619854867805117122,8692402771453030347,131072 /prefetch:8
                        2⤵
                          PID:1664
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:1364
                        • C:\Windows\system32\taskmgr.exe
                          "C:\Windows\system32\taskmgr.exe" /4
                          1⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2964
                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
                          1⤵
                          • Enumerates connected drives
                          • System Location Discovery: System Language Discovery
                          PID:1692
                        • C:\Program Files\7-Zip\7zFM.exe
                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\UnregisterTest.wax"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1864
                        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
                          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
                          1⤵
                          • System Location Discovery: System Language Discovery
                          • Enumerates system info in registry
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious use of SetWindowsHookEx
                          PID:1336
                        • C:\Windows\explorer.exe
                          "C:\Windows\explorer.exe"
                          1⤵
                            PID:1048
                          • C:\Program Files\Windows Sidebar\sidebar.exe
                            "C:\Program Files\Windows Sidebar\sidebar.exe" /showGadgets
                            1⤵
                            • Adds Run key to start application
                            • Modifies Internet Explorer settings
                            • Suspicious behavior: GetForegroundWindowSpam
                            PID:2228

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\957ce92f-d664-4c40-9bb0-89a4d347106e.tmp

                                  Filesize

                                  324KB

                                  MD5

                                  07e287a3e62963a0f192d576b47143f2

                                  SHA1

                                  934d9372899f68626c523a1aab951545fe08236b

                                  SHA256

                                  5b459ef18c4ed6721991e4418461567cf0f4652c6a98c26d57361414288485fe

                                  SHA512

                                  779bcd9ea0a938246ba875fbca0509f81e3f95e02664f14e8999e26439fec74b7d6c44edd122d4da52116862c7060c47244537e14f63d1ab90e4fab2a9459f81

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  aefd77f47fb84fae5ea194496b44c67a

                                  SHA1

                                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                  SHA256

                                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                  SHA512

                                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  a88eba2ffe3339e3d418ec84cddfd66e

                                  SHA1

                                  ca2dc868f3a86bedd38d2336b489f1c83fe07124

                                  SHA256

                                  d3eead93b7f7b755101498c46ece15a0d25b88f257001f14a7e9f3183552ae3d

                                  SHA512

                                  fbbfdd55f63118366ca94117d2360428123cd26a4e6fba230afcd2431e3172a074efac4b97e65c5db18db748fe1d4dcac682f34222d56f8ad0cbcac0faeb2156

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  324KB

                                  MD5

                                  4996185cde3418e45e9d8ea799b2ec0c

                                  SHA1

                                  e0a38882e003f7860f601f48a3cf4027589980cd

                                  SHA256

                                  1bfb821d2d07fad195a326f2b7f0e977802c4e6d4f229023d034954d94bda291

                                  SHA512

                                  45c7956a323a9d9b1d8c539784d1f754112a3a2f1bb1aa704274e9da1bd4bd15ba12418cdbf58c0611a82af7b359d023f1f52c41d8b60965acf6b1253667f3c6

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows Sidebar\Settings.ini

                                  Filesize

                                  1KB

                                  MD5

                                  135172bbd8c8c68fb45f6354b44a00b8

                                  SHA1

                                  bfab9567990aa17f61a16f1f8bde9765efdff3a4

                                  SHA256

                                  aba882e8c43cd397c0fa3ee2bcf9799544285160a048bf9f1d69956f23888236

                                  SHA512

                                  0bccb06bc34ef11cdf6ca01f2c7113717a6670649c4ad8bb58ae12f03125d98d7bb90082964d631277e041fa2b765b04a00cd5f6de56e0dcb30d1e16dabed667

                                • C:\Users\Admin\AppData\Local\Temp\Settings\HxD Hex Editor.lang

                                  Filesize

                                  3B

                                  MD5

                                  392b810f865591aa5ec210e849ae769f

                                  SHA1

                                  f3fd0c8f2a347e168ef392e38c52f4134987a3a6

                                  SHA256

                                  78b33626b46709ebe04edd99ea813ed291183bebb025ea5e4783ca2260811943

                                  SHA512

                                  5d650d9045243ce2495a845683b3252419bc283fe9ecec85b56de0a179a5df77d8ddf8ccb41ff555043bf1e9a3c9a0a3e1efec17cc2d291b5236589a80df0f04

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms~RFf778823.TMP

                                  Filesize

                                  1KB

                                  MD5

                                  1c14c84348813cb5e3ff4cdab3105e70

                                  SHA1

                                  7c87634748bc1371699b4f0602b634bdca9a27ae

                                  SHA256

                                  1576096c818b796f386cfad76e31421e18a7ddadb653d07a1190897c490ffb1b

                                  SHA512

                                  ade6d6c59a6cc3510084cb87d5f51eae3e905534d9afab59f4ab5e88b130e3d852a19d11b6787ef5c76efc3d49acf72ae127e25e95cee2b62883ce2129d48d86

                                • memory/1336-183-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1336-181-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1692-168-0x00000000025E0000-0x00000000025E2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2708-43-0x0000000000400000-0x0000000000AA8000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2708-163-0x0000000000400000-0x0000000000AA8000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2748-1-0x0000000000400000-0x0000000000AA8000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2964-165-0x0000000140000000-0x00000001405E8000-memory.dmp

                                  Filesize

                                  5.9MB

                                • memory/2964-164-0x0000000140000000-0x00000001405E8000-memory.dmp

                                  Filesize

                                  5.9MB