Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:25

General

  • Target

    8afdc9240ea61ea08642fa30862d601dc89b0462126f1b10d1c745801a2a2da1.exe

  • Size

    896KB

  • MD5

    d4701a1ac4012a63c25e74b796b28cea

  • SHA1

    732f38b96dec7b63049801a794d7f472a06eb910

  • SHA256

    8afdc9240ea61ea08642fa30862d601dc89b0462126f1b10d1c745801a2a2da1

  • SHA512

    c33d0d33e2c3bf50e313505fe6f4cfdf1e10fd1a4cc0e69e294e1cafcec9b48d588fc782d1285120d2d29cbf8979c28d017f3f64a7480d075aa24af57d4dc6c0

  • SSDEEP

    12288:3qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga8Tl:3qDEvCTbMWu7rQYlBQcBiT6rprG8aMl

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8afdc9240ea61ea08642fa30862d601dc89b0462126f1b10d1c745801a2a2da1.exe
    "C:\Users\Admin\AppData\Local\Temp\8afdc9240ea61ea08642fa30862d601dc89b0462126f1b10d1c745801a2a2da1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9f55ecc40,0x7ff9f55ecc4c,0x7ff9f55ecc58
        3⤵
          PID:4912
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2024,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2020 /prefetch:2
          3⤵
            PID:2008
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:3
            3⤵
              PID:1472
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2004,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2436 /prefetch:8
              3⤵
                PID:2976
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3140 /prefetch:1
                3⤵
                  PID:4908
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3296 /prefetch:1
                  3⤵
                    PID:2512
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4640 /prefetch:8
                    3⤵
                      PID:1180
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4800 /prefetch:8
                      3⤵
                        PID:1156
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4820,i,16339147352295143642,5384391168767241385,262144 --disable-features=CrashRecovery --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4648 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2132
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:1044
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1812

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        f1b5dd7e8271b2f4d0386a052c147b3c

                        SHA1

                        653718316e61cb0b233f965357cc2900f6da5c21

                        SHA256

                        f84bf7ea3f8567940588409475347440fea03a49d1ca286f0caa1ddfefe92454

                        SHA512

                        07e86d29468760689bc35dfdc45cab27791bd9672d67f67a404fac71d7323e9b9683382b6443fba3af9b86626aca4d920427e6e4c4dca41580fab375dfc8255d

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        288B

                        MD5

                        42628887af7de177bc97ee9cc6d5144d

                        SHA1

                        b008cd561e7512f430b741e28440202680732f06

                        SHA256

                        c46d7222172933bbc42a345df7a4e8b7fa9eddc34585aab31a6b6141ab8db7ee

                        SHA512

                        f5e4feb68b4c9c3289f618f12d01c6ab2427473d35d56d31a951ef9d2e3f95bbefb4e1ed85d211afdc7e4bee3e3aac79cc1589b9cb5e126b2ec6b74ea7147edd

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        bbed898c4da841696d4ff3a67ade6b63

                        SHA1

                        0669c0c351127eec19cbfb25918fa28782543bae

                        SHA256

                        ec34f06a4962deaf04d2b4367ddfd67eb3056c8bd948f813fcf21eba90df4320

                        SHA512

                        26c0ae9e0aa34bcb34855bfafaf7f51f7f41c5c08383797dad549d47ff0324a9a540177f07142127d3578fe6c8c861322ae8eae3c683ed5607b79f08b98a8553

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        43aff5aab7daaf8a156f6e133b20336f

                        SHA1

                        47fd0299f6f3627f9690683619eeb2cc4db98e2d

                        SHA256

                        1075de412fb753e2bb12922823a5d0944739b681d29ce4ec07ef969f58896a6d

                        SHA512

                        4e8647f740dfb16980782e12893ba3da787c87b7716e808a2deb11209df90db0469057c1101d48b457da476555421cdc044ba23f0832289ecea12ee067cddb0c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        859B

                        MD5

                        5659e6b63122f8f8a504d341b30716a3

                        SHA1

                        1664f4ebddb9f46e77aba878fc5843c5478c3e61

                        SHA256

                        2bcb8b3003092153c5cc9837c10d3e1c6e999a23c56aae7754a790321dbe0167

                        SHA512

                        4593e4f574ecc5001999a017af7201973f54e4fb66e393f9b73490b5ff3f45520e143559eb44651954ee8bf80af999d91a6928f0f747370951eed4c147eb8781

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        f22a4a5a95dc76c814ef8b422642fe72

                        SHA1

                        0ff9f88db666228a45b53d1e0ae68af28e718804

                        SHA256

                        ade4427e004cc39037b9bc01d3d32cfa23efcda52080f5e5126166d21b05cae6

                        SHA512

                        867d957dd3fd7aed59b871e17fad49ba6685d82a27d7d607a2210a5d3eed01cc6670b3bae4524ba1b29ac95ea19fad5a085b894ab47e556890258f4df76879c4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        8a16aa5d02d9fceb1b9dd6019bb9c749

                        SHA1

                        cc46b7868827aea2a0d6eb0c2e6064b1d895d96e

                        SHA256

                        de1a68ea616a73bc3fea0fe2417d3f0fd26d81d96a14c3624dcb7ebabe9758b1

                        SHA512

                        7879229e5be00f39084ea6c0cf8e69e01f82bdb5668b93a41b8e45c7c06d7aad279470355f4838286d711c2297438d4aa944637e8fe38b05853f5a9443d10b5a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        1d8049eafa10bcf5f681be97ce897816

                        SHA1

                        9578396b752a9c5351070c472faca198819a4a0e

                        SHA256

                        4fc425dc09af592805ffc8b271cccf2c1837e92702ba6a263fed68c3caf39548

                        SHA512

                        54f9ebda21ae80c585e89b3419004e57c82cf80014df4617f0146cb9aad4961af8cddb1620fa2700e4a57d0f6bb2c3216babd4fb92ceff8d41f21c15ec776035

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        ecaf0b40091b3e0cbcc04216ef06e5b5

                        SHA1

                        c4708b5c7b93c0ba2a310a8dbd173c97b7b5f9bf

                        SHA256

                        c62a5b819a35edb8d8c3deb990a8363a33e5e2649e8e0be84dc2147c282e54fc

                        SHA512

                        1f2420bafdb5ffdddef51eaedc6045662a887cd6cb1fcc0830cfdc1ba21079f9dc2e811b4cd589dbd37ecdfcd55db5c730aadac6411c5cae7b54eb22db1cc443

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        db05a4783fe8e42a315d9b47bbf53092

                        SHA1

                        3604b3f1add984f94a8793f0347e43c8ac273d8b

                        SHA256

                        0bf057e97bde2ba059aefef6b95395b07e7648a112874b2771153cb11994f14f

                        SHA512

                        e093db486e1481094ec91237633a823581a95a78ef31f1454d048dd527e6d4bd9ad296f5db0c918243d9b7cfb8043093e41279fbcd504e5e7f22bfb31cfac259

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d638f863-f1f1-4e6e-9d43-e0ed86524ef1.tmp

                        Filesize

                        10KB

                        MD5

                        4a7dba335211bdf8ca62e54512b110dc

                        SHA1

                        696f7f5147a68e88d4a6c53db4ce4445813b4ad0

                        SHA256

                        ac8988c6bb13b76d8f6983c6da6807584939aae4cbc371cf479fe2ec22ab010a

                        SHA512

                        b13a6ebfda49b8ca94e488aacbe34ff8ae88b5c16266f7ecacec27172fd8fcfa1bdacdf3bb56554c6c09230cdbc5b1eed65098efa6db5d2bfe53a7ca3814508b

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        210KB

                        MD5

                        e92aa3d1d07837430ce5d7fb9b5e86d8

                        SHA1

                        ce126c41b817063110b9db4231d42e9d36d34950

                        SHA256

                        85c6f2e252dfdc3ed623d4260617be3eb7eaa50a9d4c894d55bf887423fbfe60

                        SHA512

                        bba07dd8d3723e1831b0e70aeb71de9fe190ee2989c3db1eee7be90ac2519b9036b82b1d616dae29d9797188c5d83a1f66590a64bca9500439a3a164e7eee1e8

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        210KB

                        MD5

                        2a0c026203e7cc0baa129e4e89c1dad9

                        SHA1

                        f2d279b552d9bfeaf8ea6cf0878899b4c30d1306

                        SHA256

                        c9137afdc3ce4f4e5773945b5ff2872d3bb367fbffb4bf481a031ef108e87306

                        SHA512

                        d6353a93af0dfda568bfb1de1a830909be590cd6372cc90af25fcc879cf58f4b4754cd4c7e5991ff75a107992a493fb22e31e0a84b7f0eb600731cdf8b7715ef