Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 05:43

General

  • Target

    https://drive.google.com/uc?id=1OaxiBhEoCqL_t5HL1wJ7K__vk66Vcikv&export=download&authuser=0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?id=1OaxiBhEoCqL_t5HL1wJ7K__vk66Vcikv&export=download&authuser=0
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa332fcc40,0x7ffa332fcc4c,0x7ffa332fcc58
      2⤵
        PID:2832
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1960 /prefetch:2
        2⤵
          PID:4888
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:3
          2⤵
            PID:2276
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2252 /prefetch:8
            2⤵
              PID:2572
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:3100
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                2⤵
                  PID:3304
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:8
                  2⤵
                    PID:4340
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4620,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:8
                    2⤵
                      PID:756
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2956,i,7126653969833908977,9897891769117263361,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5064 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4000
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:2272
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:2596
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:1672
                        • C:\Windows\system32\OpenWith.exe
                          C:\Windows\system32\OpenWith.exe -Embedding
                          1⤵
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:4000
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Por medio del presente, se comunica la denuncia por el hecho de agresión familiar en primer grado. Agradecemos su atención y quedamos a la espera de su pronta respuesta\" -spe -an -ai#7zMap30899:398:7zEvent26702
                          1⤵
                          • Suspicious use of FindShellTrayWindow
                          PID:2152
                        • C:\Users\Admin\DOWNLO~1\PORMED~1.AGR\PORMED~1.EXE
                          "C:\Users\Admin\DOWNLO~1\PORMED~1.AGR\PORMED~1.EXE"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2136
                        • C:\Users\Admin\DOWNLO~1\PORMED~1.AGR\PORMED~1.EXE
                          "C:\Users\Admin\DOWNLO~1\PORMED~1.AGR\PORMED~1.EXE"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4956
                        • C:\Users\Admin\DOWNLO~1\PORMED~1.AGR\PORMED~1.EXE
                          "C:\Users\Admin\DOWNLO~1\PORMED~1.AGR\PORMED~1.EXE"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1580

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          3c8f30dda962eb714f14a9b5ac42a2ad

                          SHA1

                          07905cc938319e13d8c513279fce0a06f5d80939

                          SHA256

                          a5e03c5472061ab6bfeaa31f056c310b2194ba754296bdd897e49127916def07

                          SHA512

                          620d94933bf98071648e28d03485bf5b6a3f921c5ad81cda19fe775c2f5994e9934686ea9985cfec1c486663d7a0a830fb7cf5d76e0a3d18814e451593aadfd4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          3KB

                          MD5

                          bcb15c726f97329c4a40fbf7258a93ba

                          SHA1

                          e787b5155da6402de9928f0e949ef568f1da1577

                          SHA256

                          120917b3b37bc8ea5d4b40b71e1d5826eed27c8092711fd42e1f9fe3bca39414

                          SHA512

                          65fc7de20ea2adc9268dea18d28b5ee7407227cda0b92e981eb18b707e71cf40d2c85af42118b99b38d8e80a0cc9a507cc25c9aceb005fc3c18a24617f98b5d1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          524B

                          MD5

                          c064468b1736141033d70588da859f10

                          SHA1

                          4b0718f74916ffed44e0f56ca8d0048faea62a7d

                          SHA256

                          95f0088c62340560b92e481834425df8fa277fd2739fb845435eae72936677e6

                          SHA512

                          71f31000986c632315193b848e3aeae9e6982572365232afe7b9315a36a7938bbd2e872552b666614b1296735ac6aa87f023cfdfb7e7bcd188c1a861078ebc07

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          a23d8180cf887e8823987ee163330273

                          SHA1

                          87c545521ff8ad526f18ba73d9e1eccdadc012bf

                          SHA256

                          5fddcb297d417b3a62d7667a4b614f280ae384139000d20710cf2dbc8c0bbda7

                          SHA512

                          79f6dc2f40c9ecb6b1b407ffe04b35f08f061706478e65972d2f9fe1723e70ab74934fe040ecdae5617c2e81f7783170edd5914f2ee1edf9d7ffb9180dc1fc1d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          54c5203725206e881b0bf6d23ae710d7

                          SHA1

                          78bc7178b79af83b2f5666fd893609687db124de

                          SHA256

                          a21e35f0dac961060a06524c7b7530968d601b1de6574e11c67f72115fb39a47

                          SHA512

                          0c6b554110eb64a6bbdabafa533c7c521324461789b02afbc8284de9e736ed2cd3992bc4676cb0ae67af57f032b55ff2f31b188f4ed39524999e993fcea480ed

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          04c43b4b36e729ec5d4b0932c92552c7

                          SHA1

                          21216e4585ab8237322403cd7829b7fdf8866167

                          SHA256

                          a15f6f9b63e97191949cd74c100dd4856a1093c03351c9981ec887863f9ff4ed

                          SHA512

                          343dd2c0c66afbdbd75fcfb1eedee450e50d86f7dfb3b2fb4f4d5709ce8a2d6f831b11af40f79fadfeda8da17b7e2705379f9a1a249de3c6e4b1e7f48071f550

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          c08dbfd99221923b900e1b77e995d93b

                          SHA1

                          2c6443ea533dca93a176ce164387ea7b3709a6d5

                          SHA256

                          301f5fcff8855aa9377c3b7b959404749f25b99d10d04ea86bff3ddc22b8221a

                          SHA512

                          1b529e8822837437a1afe17e06848163d9bc9e04cc5b7d8833f56875573913f4b6dec74a0946715cfdbbe2bd012591c998f5b061e62dd90bb1e602eb5b99897c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          bd612d8bad7c842f3cfb064f5294e7cd

                          SHA1

                          11f6e5b3cc2cac5b2f39f32ee73aa57ece409fe7

                          SHA256

                          5847fe765e3e7dd0bfe4b24585e5844cbcf6301c67de1ffa31743457467e9f95

                          SHA512

                          36685743e1e58e7b7d014341d1ec22325e290c88d3430b48bf22628487cf6d5e4b99806d7166ebcb52a130ba872714218f705a7e79972ef96d57ebde9fa1ac00

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          9f01b84869a9e1559848ef8f3190c6ac

                          SHA1

                          897bc73a1292b54d3e68f3e95a2b2cbae44c3e04

                          SHA256

                          274f9bf45a1aeedb19b32e08012737e389ac7abc96a43d32742849db217f2621

                          SHA512

                          cc9b2c88601a4d51da7efd3eb1cebc5ebfb72cb503a674c77f5d1d4aee730d6a9b4f8d27be060c2ea1602d6e87a552b0a91a6e6ab50e14589ae2f19c1e30c594

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          103f0e1fb4497630b74a6277c6076b31

                          SHA1

                          eb3c09cb9b8ca33a948e1476201b774e780af200

                          SHA256

                          70085be051c78aaf5dfa13bcd5d7e27d2157f6f91e3cdd7cc169bfaef1e3dfe1

                          SHA512

                          a2dce99e4ef304f098720c272ea2850a9a43d6f160cd0714b835e895630704ba0caa4926fa179191e65bde2de98b274559533c4e83648dd6787e38f2a1ffa906

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          4438a3f645899255db610550551a914f

                          SHA1

                          296c33878976cd53f4e7a1496583220a2e9d1254

                          SHA256

                          791db52a4c58b788a53affd11bfdba6990dfef958c2a4599f83606355b46bf3d

                          SHA512

                          ca50f0042316c6169d6450e6fdad59f96c65bb882b0afee850583a3e25e93b03a11a5d159571d6dfe7d66e49c7e82ced742c9ce20361112d58971960555361ae

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          db3c22c9686b6c69726426ccd307c60c

                          SHA1

                          0cc21d99b20ffd901b47293bc7d75b7fb35cbbd8

                          SHA256

                          995fb090f413a3b107d6c5d81dbbd1eb04813a78387ead1aa67575f12a053bfb

                          SHA512

                          417d93ca46a0baaa6a2d5974196319478ce9c854e43e166ad801faab7a8609ea82920275cc5193eb25e3d00dff384d52952cce055786a9446342a1a0d24e486c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          c7ab97e021b8f9f96d408ded10bc8ece

                          SHA1

                          db8b677a90b3b8fca619f41c5286e48d6de425f1

                          SHA256

                          3f7945748a3151d665c19c529249bcc25a91785918f5244fdd5485cc2ac1290e

                          SHA512

                          07d277816897fa453ff0e91b6e241b53b2853306b9d5a41127627c30d1bf4c9d2a0e1dfe2aa34ba5c59e127ca5eff33dcd228749cd426ae758d1a81ea82b862e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          116KB

                          MD5

                          641268af933baf7dc71f024dd904b425

                          SHA1

                          c7991c6bfa7ec6c9d8a6b68b2798b79adda2155e

                          SHA256

                          61d3cefbc72c445f7f2967a3ab705d33fee182fd54682cd67ac899f5c65462c5

                          SHA512

                          78d5f83667205a29044b1fb55fc88099b3c296a90aa5e0cb5106afe53047aa137e93bf77ed33fdc0388ca78ea5dd697335afa1f5927acc55a7468905acb9c5ba

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          116KB

                          MD5

                          db8f54ca41b063c3fb76ae550d28157c

                          SHA1

                          e2d1989537a9f2c4951c901d12b8843c3ff40b88

                          SHA256

                          9e2eab5788b8aeb7288d59c5fad61bad5d14e697d1adb7ba3cc603336dafb31a

                          SHA512

                          be638633c5dc6d2c9600cb7f963b8799d2d54eac68eb4a2e4c05cadb383b4a5f57f600a7f3b1cbac8904c8106d2b6c6f59aa6cae4ee59e9863f9a0479be883b3

                        • C:\Users\Admin\Downloads\Por medio del presente, se comunica la denuncia por el hecho de agresión familiar en primer grado. Agradecemos su atención y quedamos a la espera de su pronta respuesta.uue

                          Filesize

                          29KB

                          MD5

                          38af09e95ca502fa7ca5dad46e24b4b2

                          SHA1

                          b43a78e7eea8cf493469cb2e3e7eda5d0fec2ef8

                          SHA256

                          88f944867922e09ef28b2aeccc12822425be03bdfcb2cd9048cc7ce2d1d5e40b

                          SHA512

                          36577c312596a7727718e55a06fec414b370cfad755442a90d15d990a9dcbbb16b6978b87924398263f911756128f34153f9c2c2cc3d8a3c22cb2132f4309622

                        • C:\Users\Admin\Downloads\Por medio del presente, se comunica la denuncia por el hecho de agresión familiar en primer grado. Agradecemos su atención y quedamos a la espera de su pronta respuesta\Por medio del presente, se comunica la denuncia por el hecho de agresión familiar en primer grado. Agradecemos su atención y quedamos a la espera de su pronta respuesta..exe

                          Filesize

                          379KB

                          MD5

                          ee1e59674071a1c4541fbaf6f6f582cc

                          SHA1

                          f1b3689389c286197e297a903942d20d3527d2c0

                          SHA256

                          e6142fe26f2b69d6a0c29383eda5ba3ea883d706aa86f406a79668a346907d34

                          SHA512

                          dd3d6dc531b453da6b583da7e0ec40b2f25ebe541ae0a0189d07be4a95491e1d6174c3b2cc9cf97d7fa773991b1fc4b4335e1cc9fa305c6c253fd451474e7e5e

                        • memory/2136-104-0x0000000000D60000-0x0000000000DC2000-memory.dmp

                          Filesize

                          392KB