Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:14

General

  • Target

    45f5cab2004c69fcf1843e538f4495df4721c19dfe90182dbd3f8a9173c1b0ab.exe

  • Size

    896KB

  • MD5

    5fddba3ea4c1b47542e1da4ccc92cbb3

  • SHA1

    d8768c4cdc2a01b757ad5627bc976dc1ff25ede9

  • SHA256

    45f5cab2004c69fcf1843e538f4495df4721c19dfe90182dbd3f8a9173c1b0ab

  • SHA512

    a09b256c57ab29353873afb95de38807ceca5cbc44ca6da2a3ca158caa3153ed098ad9851e522f31fece6757fe244e4d5d749a2735fb65dd7a16d233e21a8d11

  • SSDEEP

    12288:oqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgagTb:oqDEvCTbMWu7rQYlBQcBiT6rprG8a4b

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45f5cab2004c69fcf1843e538f4495df4721c19dfe90182dbd3f8a9173c1b0ab.exe
    "C:\Users\Admin\AppData\Local\Temp\45f5cab2004c69fcf1843e538f4495df4721c19dfe90182dbd3f8a9173c1b0ab.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb970fcc40,0x7ffb970fcc4c,0x7ffb970fcc58
        3⤵
          PID:4432
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1732,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1728 /prefetch:2
          3⤵
            PID:4908
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1884,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2052 /prefetch:3
            3⤵
              PID:4912
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2456 /prefetch:8
              3⤵
                PID:2272
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3132 /prefetch:1
                3⤵
                  PID:1044
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:1
                  3⤵
                    PID:2092
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4608,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:8
                    3⤵
                      PID:4868
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4592,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4704 /prefetch:8
                      3⤵
                        PID:1876
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4652,i,12125008766868423716,9974446547035649573,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=724 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:936
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:3104
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:452

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        d1074eff16ea4eb40f4aceaec8adb7f3

                        SHA1

                        a5e6c7ddd57508fb7e9a8d797b367f34edc8d5e4

                        SHA256

                        298bf055f8ade5cc2436cb349fab313d63195d343a85a3259714a4fa4bfc98ca

                        SHA512

                        bffc4a81c340b15fd4210686f670f8212a3b30e7b4aa42783bc81259f253e7a8cca59b6622598f48b8463b4b529fa4bc94e737e41f2f5629e79ebc184c9fc3a4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        288B

                        MD5

                        8738682f4c291af7ca40cea9f87a7292

                        SHA1

                        64c4f44fc72eae650a75c8e638022f024b5dac70

                        SHA256

                        74e6d74d7927468be0c950827a25763f7af851517cd127f3f4f29d17490b814f

                        SHA512

                        91aaa1743b17ad4b1479f5da3d310f2f7f051008cebe0b145de51dc2fda43920c6473e26dfbbceb26e3651e27632e5e7a3eb8767dee66c58c2d05bb778edfc80

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        ca6d937251808f5ab8b670bd3f43ab03

                        SHA1

                        25a911eb742a0c8d9fac5cbd66f90045a830a97c

                        SHA256

                        92862db5dfa560913b72baa5a8413db630bc1ad8ec8abc49e1e5144f392caca3

                        SHA512

                        65c16ba5ae58202d3aade85e9b56ece19e7991bf2488e8dd1fd6c025618a6604d1a2fbf5504f8f8428f1ecf7c21531fb6f75826a8fff82a66bf22bb13a52888e

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        1c22a25379bb7c0d10d51d3414fa2e5b

                        SHA1

                        25b66786c43b303084c8acea0c44e628ebb26b9c

                        SHA256

                        b1ae9c2b31593024ae47ea4b3e4d8ece45ba533646b6400bd5ca9e220aeeb79d

                        SHA512

                        468597e4013f4f89f5671c3828f965b5e1467603ff24985820337c13e87ef9a6d3708428fd35f7db00bca84d06eea93109a7df40fbbeeb2bb956bd638d4ca703

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        859B

                        MD5

                        f9e93492ccece40ffdd4c1f83056dd1d

                        SHA1

                        36a903f3ab1fc946dc7b0b61bcccef3c45fba7c6

                        SHA256

                        4d7243b6ce4fc82f11bdab4c61222f21a46d7ba59f70ac30bbe87fcd93f0672f

                        SHA512

                        42b3205b518e4d569150e5b87f4d81b48ef114a967b401d7181bc35b77ca007f9f745baa88f2297b5e5079bf66e033db3edd9c41721064d6681232ed82ddd848

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        87edc4f058ecfff74300524ec5a5bcb2

                        SHA1

                        3e53b28cdb246d28d6b1a1ea49e67de4ded2d49d

                        SHA256

                        463ef04b35981f5a8c598c68e3c4653f7cc21cd478bf34b9e59e4d86f2be922a

                        SHA512

                        7430bc1dd9e0da36b63decd0fc44ed63d6668041d86c71db0428b8e926aded553e76874854a447ea79d3dddba7eea30adde9b091ffc9e861dcbafd654807374d

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        e5428492da83f1d33000cf89c106d646

                        SHA1

                        6b61f3b165d44b0e51f5842df29efcd3e641a9c9

                        SHA256

                        5185d7212623bb6c43af4891c7b32eecfdb8a803f9ac75ec7d449bab489dda64

                        SHA512

                        6498b1a5346eb6985a660a4d0244ab09200662464c7677e52025b055528d8187aa91a725aad0873684cb916b2865f077c433799204b2bfdab0ea0329a588e52f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        6e2342821110dadbdc6f51e85470e9fe

                        SHA1

                        9006d8c795436787c5af4d70917e29659329494f

                        SHA256

                        3b18ee7e79bdbf669d9f3e3055d078ad6065fca530e9beb7929e13fcc91eb0ec

                        SHA512

                        4ae1dc5b1e7ff38424d22fc1decd0efb10ef36be6d4c157e1d9a1811249b59f160e4ca2138fe3d854b148e40a9a167884c4ac7b4390392cd88442cc6b38f2f5f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        1128a412517bb697528da2e0e3d94a0a

                        SHA1

                        16c83c80d8f7bce3339e93060b8dc424a7928441

                        SHA256

                        0372739c1846ac2f01936535506b2623ba120ea5496957f2ac7d7d23717acca3

                        SHA512

                        9641ac92e8c3faa845e900518699f90986ee176306cda60e0de39c1504ee21dd061bc1fa222043cb04b313cd3ab01edfe6015880a54c393686b2fe1f62171c72

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        3212ab3a2d14779833bb6026bd7b680f

                        SHA1

                        6b3818fc0ff8235683a09b0dbb5117ec433ea4ae

                        SHA256

                        19f06447c517c2e6b466038463bdf87a35ac1383dfa9a326cc3509f502772ecc

                        SHA512

                        52112d38b001290b8e4d634b32a466468534f12befce0304bc582cc5be3ada5ebc31f7270717bc7b01b0e2df49f2ce5300df3c5687e1b8fd99b704213d2cebb3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        a45acfc6d7adc71777458c8e673aba65

                        SHA1

                        45650052981b6013fa9a9bbe9e8e8a7492359836

                        SHA256

                        ac33279b22050e800f04882e13f9c4bcc46a8c04ccf9f7d84435c0dae29c1d97

                        SHA512

                        9a883d5ea412164f36c4c8ecdcdf8832ff30304ddc407cd034679f93bcf0e622010fff5d65454f5d68599a3f80d3e1f985cca036c03495ae212a148445623bb3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        210KB

                        MD5

                        2b46cfac0ed19d48648cb6043d02a78f

                        SHA1

                        0d51223e0b6cfc1895b8f4cb0d4dc0dcb99a5eda

                        SHA256

                        1b11a25a6ffe456f84eca6eea51e954ef1a0175f4c40e2b3af09fb4e6ed08f7c

                        SHA512

                        fe48d315053b4309e78b15d5f44999c4741d1f3a40fa2b2aa4342df5becfc2d28be7cc31ce728882235c212788d355b7aa2da60119843b46205384292b8e75b6

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        210KB

                        MD5

                        f626a75577a1bd179056edd19af740a2

                        SHA1

                        5ac99c54e6de1023b7cab7eff92eaf9a16cf38e4

                        SHA256

                        1d847e094a7b8b8c1473d15cede059fffcda30a30a91c5c3694464f1f4bf93c1

                        SHA512

                        5d39e5b506f4d52d0852bbce454ba20ce64fefe584bc52717fb0737821156be5f105553f85b38df1633cfb119767d8d5adf41c095daede498b3533e05660872f