Analysis

  • max time kernel
    52s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 15:15

General

  • Target

    mlode27gb.mega.rar

  • Size

    17.6MB

  • MD5

    fd9af755a885dc8d3ca202b85ea5de3c

  • SHA1

    3bd012bf915c0d42f14736741295eb2c8f29d4ee

  • SHA256

    36b39ead8c247bad509fdc3a262a500fb2d1c7705d386d767d7a1396bb70738a

  • SHA512

    afc65651c6b26fe931572f39da99b254b40559859f565cd9c14c40427e794ff08e201506cb4f6819b31eb865190e070b9e97d13903caf91a793d1dc1a80299f2

  • SSDEEP

    393216:Ds+QtcKbFQQZrRmTjvndcUtM1FpVfEjtlSo:Ds+OBFQNvdcUtM1F7s

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 60 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\mlode27gb.mega.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mlode27gb.mega.rar
      2⤵
        PID:840
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Loads dropped DLL
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7639758,0x7fef7639768,0x7fef7639778
        2⤵
          PID:2444
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:2
          2⤵
            PID:1820
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
            2⤵
              PID:2288
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
              2⤵
                PID:2908
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2212 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:1
                2⤵
                  PID:2548
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2224 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:1
                  2⤵
                    PID:1468
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1340 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:2
                    2⤵
                      PID:964
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1436 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:1
                      2⤵
                        PID:3036
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                        2⤵
                          PID:608
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3576 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                          2⤵
                            PID:1060
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3620 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:1
                            2⤵
                              PID:3068
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                              2⤵
                                PID:1728
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2532 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:1
                                2⤵
                                  PID:2696
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4052 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                                  2⤵
                                    PID:2136
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4124 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                                    2⤵
                                      PID:2412
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                                      2⤵
                                        PID:920
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4112 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                                        2⤵
                                        • Loads dropped DLL
                                        PID:1060
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4264 --field-trial-handle=1232,i,9887877748548042498,14283414643424364064,131072 /prefetch:8
                                        2⤵
                                        • Loads dropped DLL
                                        PID:3000
                                      • C:\Users\Admin\Downloads\winrar-x64-701.exe
                                        "C:\Users\Admin\Downloads\winrar-x64-701.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Drops file in Program Files directory
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2440
                                        • C:\Program Files\WinRAR\uninstall.exe
                                          "C:\Program Files\WinRAR\uninstall.exe" /setup
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Modifies system executable filetype association
                                          • Drops file in Program Files directory
                                          • Modifies registry class
                                          PID:624
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:836
                                      • C:\Windows\explorer.exe
                                        "C:\Windows\explorer.exe"
                                        1⤵
                                          PID:1212
                                        • C:\Windows\system32\DllHost.exe
                                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                          1⤵
                                            PID:920

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Program Files\WinRAR\Rar.txt

                                            Filesize

                                            105KB

                                            MD5

                                            b954981a253f5e1ee25585037a0c5fee

                                            SHA1

                                            96566e5c591df1c740519371ee6953ac1dc6a13f

                                            SHA256

                                            59e40b34b09be2654b793576035639c459ad6e962f9f9cd000d556fa21b1c7cd

                                            SHA512

                                            6a7772c6b404cd7fee50110b894ff0c470e5813264e605852b8dcc06bfaeb62b8cc79adcb695b3da149e42d5372a0d730cc7e8ed893c0bd0edb015fc088b7531

                                          • C:\Program Files\WinRAR\Uninstall.exe

                                            Filesize

                                            477KB

                                            MD5

                                            4783f1a5f0bba7a6a40cb74bc8c41217

                                            SHA1

                                            a22b9dc8074296841a5a78ea41f0e2270f7b7ad7

                                            SHA256

                                            f376aaa0d4444d0727db5598e8377f9f1606400adbbb4772d39d1e4937d5f28c

                                            SHA512

                                            463dff17f06eca41ae76e3c0b2efc4ef36529aa2eaed5163eec0a912fe7802c9fb38c37acfe94b82972861aaf1acf02823a5948fbb3292bb4743641acb99841e

                                          • C:\Program Files\WinRAR\WhatsNew.txt

                                            Filesize

                                            45KB

                                            MD5

                                            1c44c85fdab8e9c663405cd8e4c3dbbd

                                            SHA1

                                            74d44e9cb2bf6f4c152aadb61b2ffc6b6ccd1c88

                                            SHA256

                                            33108dd40b4e07d60e96e1bcfa4ad877eb4906de2cc55844e40360e5d4dafb5d

                                            SHA512

                                            46d3fb4f2d084d51b6fd01845823100abc81913ebd1b0bcfeb52ef18e8222199d282aa45cae452f0716e0e2bf5520f7a6a254363d22b65f7ab6c10f11292ee2d

                                          • C:\Program Files\WinRAR\WinRAR.chm

                                            Filesize

                                            316KB

                                            MD5

                                            6ca1bc8bfe8b929f448e1742dacb8e7f

                                            SHA1

                                            eca3e637db230fa179dcd6c6499bd7d616f211e8

                                            SHA256

                                            997184b6f08d36dedc2cd12ee8dc5afb5e6e4bf77f7ab10f7ade9eefdb163344

                                            SHA512

                                            d823f2c960a4d92129b9bda0f4f9195d32e64b929082b5efb9149546b5053021255d1dd03cb443f0a03106314554f76b94173e280a553a81e4ac2ac282877973

                                          • C:\Program Files\WinRAR\WinRAR.exe

                                            Filesize

                                            3.1MB

                                            MD5

                                            53cf9bacc49c034e9e947d75ffab9224

                                            SHA1

                                            7db940c68d5d351e4948f26425cd9aee09b49b3f

                                            SHA256

                                            3b214fd9774c6d96332e50a501c5e467671b8b504070bbb17e497083b7e282c3

                                            SHA512

                                            44c9154b1fdbcf27ab7faee6be5b563a18b2baead3e68b3ea788c6c76cf582f52f3f87bd447a4f6e25ec7d4690761332211659d754fb4e0630c22a372e470bda

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            f50f89a0a91564d0b8a211f8921aa7de

                                            SHA1

                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                            SHA256

                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                            SHA512

                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            2KB

                                            MD5

                                            fe56cc8d058e490c43cf59fbe2b14505

                                            SHA1

                                            bebcaf00803150a0da0977bd1ffd1d93760ca9b7

                                            SHA256

                                            f676306cf0bff7429851f8b5d6c56a501095a843242b065eaa952b063128462a

                                            SHA512

                                            38b79f436f7ce6ae91a9a9b9b962627e0b2d508ba5e6eb512c0f2854a2327795033f463526cfee58f3af087be7d6d65d49a0259f92d31e9478f5cff936333799

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            526B

                                            MD5

                                            9c030ca8bbb980632dd14c3781cacc8a

                                            SHA1

                                            5f0aed9be46ceeb51e9ab1e63db65a20366f759e

                                            SHA256

                                            45f3daeb1d8b5385ef3bb412970f32ab5f601572d24eadc78d1c75fc6d0ccd84

                                            SHA512

                                            e04eefbdb4a48b63f7ff871b96fd1f5e52978e84ef1ee0697a7e21b8f66509963ab6d3bd7afae566a5ed4648dca1efbfb577e141ad7fef01ebf7eb170431a57f

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            a2a2ad6f9e2c909d947bbb4bba88bf4b

                                            SHA1

                                            a1b1634c60e1e00a75ad128531814eb45240a94e

                                            SHA256

                                            d603c852ec050c9be6719404dfca56b14f17039e3f3c93c1b73ef415f76434ef

                                            SHA512

                                            f94910787cca7b3dab29b8952f014d5a3f57d1f565f07ccebebe976e06b258fc7c329814fa8ab7b65aae4ccca68a3d7378accef3395147f3aab87852ca56fffd

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                            Filesize

                                            16B

                                            MD5

                                            18e723571b00fb1694a3bad6c78e4054

                                            SHA1

                                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                            SHA256

                                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                            SHA512

                                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f3ce8a47-25ed-4141-951b-b8f16df2afba.tmp

                                            Filesize

                                            6KB

                                            MD5

                                            d8ac7081be0adb5d0d52e39fa0791fb2

                                            SHA1

                                            40aabc98a1f3a8a27f70d5d13936ed86f9b91ecb

                                            SHA256

                                            557f389dff50f162fdc32805d7bd619177e55b33d9159914329be8bb213393c0

                                            SHA512

                                            b904b9a62e70ec4534778ec740595bb1cb4dcd274a8de8e178d4c4f8c6791d6862ac68e685c74bb04a5df0a569e373b2f3d7cb181c8388f773ded61980d751fd

                                          • C:\Users\Admin\Downloads\winrar-x64-701.exe

                                            Filesize

                                            3.8MB

                                            MD5

                                            46c17c999744470b689331f41eab7df1

                                            SHA1

                                            b8a63127df6a87d333061c622220d6d70ed80f7c

                                            SHA256

                                            c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a

                                            SHA512

                                            4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6