Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 11:02

General

  • Target

    file.exe

  • Size

    897KB

  • MD5

    c53b8dbdf8ba6c66fb2ab243574e210e

  • SHA1

    103693a89937c0029b3c6b132bfdbba8b1eca6a7

  • SHA256

    18e97d11a627d43c7f456e6f383e0cde7a513ca0b2816a0c0303354a4179d3fb

  • SHA512

    3712c79ca439e9152d4e21b31339ca622826113e73e85b04d15dc7387b137ced389dc7558982fa4d0ea65391c2dcffbf9d67af9a282e3f061277230cf65593e2

  • SSDEEP

    24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8a4WK:STvC/MTQYxsWR7a4

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM chrome.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3764
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM msedge.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3448
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM firefox.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:640
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM opera.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2488
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM brave.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc0bcfcc40,0x7ffc0bcfcc4c,0x7ffc0bcfcc58
        3⤵
          PID:3592
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2068,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2064 /prefetch:2
          3⤵
            PID:3664
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1884,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2108 /prefetch:3
            3⤵
              PID:4972
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2240 /prefetch:8
              3⤵
                PID:3336
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3140 /prefetch:1
                3⤵
                  PID:4236
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:1
                  3⤵
                    PID:1664
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4616,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4624 /prefetch:8
                    3⤵
                      PID:3700
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4532,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4668 /prefetch:8
                      3⤵
                        PID:1392
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4672,i,16598276449375448260,9383765584781782314,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4696 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:952
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:2392
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:4512

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        ad563bc732851bf173f5fbfb5e714010

                        SHA1

                        d6c0c2a295686030f7bc20ceca199942d5c2ceb0

                        SHA256

                        7c361326bfe389e42d83dfdb7ecca74f2db60958f80f008ad6406dd4ccbe7b49

                        SHA512

                        cdab829d73570a4c63ad7b30704269e942df347d58ce37b48cf64ece3fe888a712ba084c8d5f6826ab719a584dfff98607566f54cd435085cab2b99b34fafb2e

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        288B

                        MD5

                        5beb2f0d2b0e0260e1040ae41bd3f42b

                        SHA1

                        e6c1af390b9c8e44fb4df3aaa11cea2eb9696deb

                        SHA256

                        45ecee571b85a6b70471d86da2ea44dbfe32571d4ad7db4b3703d094fffd1098

                        SHA512

                        9b56953422d1b76271ed8c25cfa0b3c396b5c6e00c1e9c529092680d9971b50bfc061a552b16f088167a0808603ccbe4e678fd6f65bfaee8501a590feb6d0291

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        66180d6ea46f6fe9f8d590cbe339b9e1

                        SHA1

                        dc1d473270c038a8f2f37b96d1ce64a4923fd9b8

                        SHA256

                        9708bc66ff34d73477d604ce3cfd27fdbe63439530e736485328bb9626cd92d9

                        SHA512

                        67703f3866918d677a289d543574fed62257e526d71bacc0a26132698e5b0d15d2e6ff4c2b5b592ad97d8532d43d3d2ef8ab6c940f866829520b0cdb868dc591

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        b539625c2b09ca3425259bf79974cc20

                        SHA1

                        b1f22427df42e4aa96ff437cdac35d558f40bf16

                        SHA256

                        2bed97f289876ed1bb44091ac6112126e4788d576a6ca1fde8ffac6ea56fb9b9

                        SHA512

                        869999c64c67e80e03dea9ac496ef1703bcacfe59701aed8718a5668532508059e4623b6ed091907d075ada98491e377a1eb41ea54a3a4d04c2cd1b0d5104bea

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        859B

                        MD5

                        9ad67de27fbaebc58162ba5147acd260

                        SHA1

                        6bd2401e88ded347941435e3774b8882014e46a2

                        SHA256

                        e4a13b524fcca0dd84b1f44bb32dcea4cf0ab22b339675ef56d74f2299aebe7e

                        SHA512

                        e966a07ed216ecbe05d14ea6dedf0b3db951b4e99f35712b748d06ac154b96b4b990e6595002764aa4b05c3ed5b24ce32b821a6b705badee912996f6a8da7786

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        957584dd76f05323648f5223a22d7061

                        SHA1

                        04908541881842127156880c8fa1abcf527af9d4

                        SHA256

                        d76341f0f59217aedd44e8409451ac7e26b9e51d13b3541d05d1d13e2ac9e003

                        SHA512

                        7f26a03040cb82d73767314bef67db1c92ef22e50b8dc428d58da9e17191597f5f0750706d5a90f6ca7b82cbbcd103b1a716272c94fd6bcc51fc6e54c2ef28e4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        b55346d37e39f538c63bd82e880d261c

                        SHA1

                        7223ba05185eb2c8ae8fca936ef851fbfb8920c9

                        SHA256

                        c6057d4a763fe75f5f08c4206ac5c967a66d1700df0f3adc5d83428e6a835b17

                        SHA512

                        e11ab267243c43ba05603a3768a60dcdae7e2122b9830a35ab07155f4ed6f8940d7924195056f04d1b7955768c55d7cbef697f9a2826926712a9f2cf16619648

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        6233df557455465b423c672ffa10daee

                        SHA1

                        24647ad9f629510cface4e119e36a58d5cbdb380

                        SHA256

                        3f6855f8baf2e3ce44586700967bf70642eac14b4ffabc40cd125e9c3fd88c56

                        SHA512

                        278b3cdb3658bc7c71a58672e2a18b893057b63976cddd04ca991371055bec29b7a8f33902f6b9e32df2dac5dd375f4c7250f129b9ef20679ef7a050efb8bbac

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        adf14581da282cb303304820bc2691ac

                        SHA1

                        5d4f711db03651050a8ff83582feaf05e16fbb0e

                        SHA256

                        4274c0c2afca6a6d6f20f0dc354505fa2734bd9d5ff81b031345b3634d2b3dda

                        SHA512

                        f35f2496df168c05e7561cae1458da3cfc8a148e97eb21bcc981ee8a479e156f4bc54eafd09d66cda5ad44a3658726b28182dc20009c99ae2bad2fa919603ae0

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        4181badbed1768690236f0bbd73f7dfb

                        SHA1

                        c3dd587fbc00232e93c7ce9d90ebd0c5fb256b86

                        SHA256

                        c2d7b9adac4409850021eeff165b2215847184bec6dd45d8bdfb54ca711074b8

                        SHA512

                        4d83ad9696f24ae7802df7ed260a89016a5484fcbaabc56da0bb1d97426a073a4d62a190924538740af4c5ccd50e48b1f48e09201e473be8880da0280f53e6ab

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        682db72df363b5993deffed0856590d6

                        SHA1

                        684b87072543aab8343e2304f5c946190a7ba6ab

                        SHA256

                        f85bbc1084b0257ee6cc466866b9fd301ffcb350eeea1f891a2fd14f68f66c1a

                        SHA512

                        305fa5d91eaf4d841472ab44447f7abf145dcdeaa641435f7511c6157f6f39b592bd1e06247565ca2af5c4847c581c3a470a5d2a9e473d5dde2f6878a19d168f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        695681bf02a8fdb937796d694e59d82c

                        SHA1

                        ad091fd057e80d54b1ba95135c93587d0d2a1726

                        SHA256

                        b182fc507a423957935363d1935803f84d073f1f13de8a1b699058b7379ceb9e

                        SHA512

                        8ea1c9f96fb3f72546cf95794ff29c221bfbca7251aabcbed92fe7ddf45a419b03849cea48920915cf0adc55e407130f282bcab9613b57788a7041e65f8d9c57

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        211KB

                        MD5

                        50d9260e003d4a840cce049e276b61bd

                        SHA1

                        f398122700c14de0ef3449333d6c39dbf44c536c

                        SHA256

                        37234e23813b3d9cef3315caa296587791a434e993d4f24ee2774d141766d7b7

                        SHA512

                        217077c2f41df3ba997edff834c7670b9004c1e6248bb2e58237c30820d77fa0d1ffc8901ba47ad499b0603851db1336b853acb855a64befc6957619e93cf2b3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        211KB

                        MD5

                        087a5b87b6f106f41ff8e8d9b48234fd

                        SHA1

                        196f558f98c48b967b3f88c0b0f6a058c77b4e5c

                        SHA256

                        837acdac517052c065c7249379af77ae3ae27ed113e86ec49537aead715b8d41

                        SHA512

                        da1aa2d5e455d748ec5e037532a404f39478f5a8677a13ff25afc197bfabbd987ecbec7ec28d9f9c5927692eb3efc75fce40ad5cca52fa259c639f75cf91540b