Resubmissions

12-10-2024 18:55

241012-xk1asazfrj 10

30-11-2023 19:32

231130-x8zddshb2y 10

28-06-2021 11:05

210628-3vdg7sx13e 3

Analysis

  • max time kernel
    670s
  • max time network
    1728s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 18:55

General

  • Target

    31.214.157.40_#[email protected]

  • Size

    7.1MB

  • MD5

    bb1570ca408cf76448102c7ecbbe322c

  • SHA1

    0445c648174ca1930c2cdb0b89902cd4e984a9ea

  • SHA256

    b0baf071692d63267aaf41bd3db933826523b59e8fca49655e1656ce0c656c71

  • SHA512

    53efbbd752d2b0dd1e13231bf8d917a5ac512962860f6ac46f76d6fb618b4a83a54cabdee5295b20805bbd6a9ce343ff2967257679419185ede4b4ab45294a3f

  • SSDEEP

    196608:qLcWN3KlidmQtekNXjglGHglGKglG05Pu0uCET7+y:MNxJHgKgBgtM1+y

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#[email protected]"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2716
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2036
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:376
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\" -spe -an -ai#7zMap28767:160:7zEvent19862
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:908
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70e9758,0x7fef70e9768,0x7fef70e9778
        2⤵
          PID:2708
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1208 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:2
          2⤵
            PID:988
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1548 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
            2⤵
              PID:2516
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
              2⤵
                PID:1544
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2320 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:1
                2⤵
                  PID:2432
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2364 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:1
                  2⤵
                    PID:2464
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1436 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:2
                    2⤵
                      PID:288
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1256 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:1
                      2⤵
                        PID:880
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3440 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
                        2⤵
                          PID:2872
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3432 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
                          2⤵
                            PID:760
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
                            2⤵
                              PID:2652
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3908 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:1
                              2⤵
                                PID:940
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
                                2⤵
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:2404
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
                                2⤵
                                  PID:1796
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:8
                                  2⤵
                                    PID:1524
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=740 --field-trial-handle=1364,i,8671550806106959890,17433269608494516174,131072 /prefetch:1
                                    2⤵
                                      PID:760
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:1600

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\553a5a26-4dcf-40d1-b567-50e2e432e434.tmp

                                      Filesize

                                      351KB

                                      MD5

                                      06460fb0653891629bdef86142842f47

                                      SHA1

                                      345295bfe6bed3b6677e7e326ed6144cbb95a207

                                      SHA256

                                      9815209fe89f30601356177d91111d5a09381cd2a4212764f70ad81591044646

                                      SHA512

                                      291dd497a4a9909ce1c631340933a33224d4e618d835144f4d2ef74174a09735ffd2864b7a3736f0387a844f170a9960eb61c7b26b2334cf1b5d2cbd470c3240

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      72B

                                      MD5

                                      4c90fe6fa6eeb21dbbbfd58bc3917dd2

                                      SHA1

                                      124a2a75b2386b0eb507dc53cb1c4b2f4382e72d

                                      SHA256

                                      c2e1d304556cd577c964be47e2327d45280a450f5225f0b09b4f64aa664822b2

                                      SHA512

                                      5156ffee5e0dbbd959a0ff744c7ccd3100c31fde972be64397b29c82e64c4b06917a5efbbcca97806be246d45b68a7b6873e8676422949b226e164e6966d9c2a

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      fcb7d03f6b69d92e0a637309a31afc87

                                      SHA1

                                      97acc7970ffb4ed856d532cb94ad03f9d8e43ae0

                                      SHA256

                                      08688ce93d40548dc1210457cf1d0438ccaa97b182eeff4b29c4c52f3da8df20

                                      SHA512

                                      5a36549d54057681a650fd05de5825d014a2b9f2e5431ff9281ea843f27fcd4ce9752977ce2fcfb737719efad604d49349c8127286edecc268739714f57aa98e

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                      Filesize

                                      16B

                                      MD5

                                      18e723571b00fb1694a3bad6c78e4054

                                      SHA1

                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                      SHA256

                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                      SHA512

                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e14a6d47-eaa9-4e3c-951b-40839a5508be.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      9a39f497b493e25d8faaf1c572f91215

                                      SHA1

                                      d4b5c9e66c0a78ed06c26bf08ef30bfbffe5b795

                                      SHA256

                                      82f4d42e95a970ec907a2d959c39556e6afe77174d650cbd0fbf8ae952be1b3c

                                      SHA512

                                      b19cd926ca270ce994ca9d21467a393b3b76e1885219edd33f4b32f41e5af672be9e55219baa6c4d3a0f3ed74da432b836ed0b046800dd026fc71b1c2bc47f93

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      177KB

                                      MD5

                                      75cbf5da4008d9fb56fb30e26a605836

                                      SHA1

                                      73cc923e55d4cd323924ce78c6b8fd0c590bb476

                                      SHA256

                                      7b50a91daef3a3c3c9e6170e26153ab05e90a54757833239d4494ef2448ef951

                                      SHA512

                                      24f85126fab239d26a69a800f199f674a177f1901de310ad91bc3850cc766fe144a0168a1c6135c02f90739b346622684e053860950725e4e155f878a11414de

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      350KB

                                      MD5

                                      9d1dd320e49a18bff4f33eee9bd6514f

                                      SHA1

                                      7173f036c71aba93090feffff0ce0463807e6302

                                      SHA256

                                      62523bcd3082d5bb3a6bcbe01ee2ceb6b01e761b7bd4b63ed6d1342d46965c39

                                      SHA512

                                      2f5daedd33197dd6133a0d16bbb77d31d21b2bc0745e511adc50d2dc1625f4750dabf32d741e9f15c0b1b90254bf5efc359532d19026a401194e9c91490e8dc4

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      368KB

                                      MD5

                                      e5ff077d08f425cc19e54d4521f6505d

                                      SHA1

                                      afa58568558fde9e2208bcb5d15cbe4fc61aa08f

                                      SHA256

                                      93a4eb215ea093ccd7540592c9850633faf7fd9a099c66453d1405e1a9084f96

                                      SHA512

                                      0b3c6f57744257d14c7c5e042a4b80c525d58313172c950e730d7a26b2931b7fe40fc50469806f9d919bc129bdd9f50438b52008ae878b784542fcfe4e5eb757

                                    • C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\supermicro_cr_second.save

                                      Filesize

                                      15KB

                                      MD5

                                      c55db4b6722cfd651b3cd17e30558c6e

                                      SHA1

                                      70f9cf0388462fa659216e82ebbf80cc582d1a64

                                      SHA256

                                      6f40f2ee97a08d6f4c6eb7995b481f5a2f5aae97e4ab2f776b6e5b64dfa87c12

                                      SHA512

                                      d05363ef23efdcaa00a0a5c60ba8b3dba875786f2e7652476ed1941ef0da9ab7cb6092db5a1c915544c3efc00dd58c15d1c9e0992e18945c10cf7e642abc3780

                                    • C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\main_dir\exploit1.py

                                      Filesize

                                      6KB

                                      MD5

                                      94a4295cd2d0df00c570a41663729f2b

                                      SHA1

                                      26ab968b9448ebb8eb98e1fcb22ebf35174a024e

                                      SHA256

                                      847d0057ade1d6ca0fedc5f48e76dd076fa4611deb77c490899f49701e87b6dd

                                      SHA512

                                      f3636e244cafb6bd57183f7886893b0af6b49f9e081bf8fb679e6d91156e5fe63c89d28a9fecf2f6c6d01affcf38d4452e42a3f59a90c4a148e4b803ea443ef5

                                    • C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\main_dir\nwe

                                      Filesize

                                      2.3MB

                                      MD5

                                      3c49e3de249c57d41a318f42f5b2003a

                                      SHA1

                                      413c288f927cd130203adede303c9174e4a09093

                                      SHA256

                                      f949bebf4a7426d8d90e6fc5cbd13e60a6704fb25d6cab4ed248f456d7424404

                                      SHA512

                                      01b4b24ce199010dbc0acaf830dd97aae7ccec1fd12085d20af6945c38564a09bf35b8160a4feb4338d4d8e4bc8a7818cec085655d66a3468e22bb3706445d59

                                    • \??\pipe\crashpad_2104_UVAEJCHNYEEZYBYT

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e