Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 20:59

General

  • Target

    https://gofile.io/d/D8yVWJ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/D8yVWJ
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff92bd9cc40,0x7ff92bd9cc4c,0x7ff92bd9cc58
      2⤵
        PID:1340
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:2
        2⤵
          PID:5000
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
            PID:2628
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:8
            2⤵
              PID:2908
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:4476
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3312 /prefetch:1
                2⤵
                  PID:1628
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3688 /prefetch:1
                  2⤵
                    PID:1412
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4500,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:8
                    2⤵
                      PID:2936
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4624,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:1
                      2⤵
                        PID:5908
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5116,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5124 /prefetch:8
                        2⤵
                          PID:5996
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5100,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5164 /prefetch:8
                          2⤵
                            PID:6004
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3692,i,10283993749963982837,2827648742395065225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5416 /prefetch:8
                            2⤵
                              PID:5452
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                            1⤵
                              PID:2692
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault79a7df7bha875h4a29hb6f1h0817d90546a4
                              1⤵
                                PID:1804
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff917c446f8,0x7ff917c44708,0x7ff917c44718
                                  2⤵
                                    PID:4188
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,13334198464372657380,18088295201432389103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:2
                                    2⤵
                                      PID:5228
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,13334198464372657380,18088295201432389103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5240
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,13334198464372657380,18088295201432389103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
                                      2⤵
                                        PID:5316
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:5452
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5528
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                          1⤵
                                            PID:5564
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:3084
                                            • C:\Users\Admin\Downloads\c94f12da-a95a-4d38-aa44-f7b68107663d.exe
                                              "C:\Users\Admin\Downloads\c94f12da-a95a-4d38-aa44-f7b68107663d.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              PID:5788

                                            Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\411da271-7cbe-4f3d-bd3c-37782619eeff.tmp

                                                    Filesize

                                                    649B

                                                    MD5

                                                    1e9695c136e83d4a83c6b48541e96804

                                                    SHA1

                                                    d065da4b124682365e2cfb16d19e31b042dc62f2

                                                    SHA256

                                                    ff28b73ad8d70864842cff153761e6c0fae080f45a8ae76462dcea486793ba7c

                                                    SHA512

                                                    f69df0d6a4cf06a8b58331d315c45001c548fac9ce2177a86486ca4e11ad4eb09307052fbeeb7fdb7553b4a11c84c74d0606e8a9351add5290f1c0744c3bd106

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    336B

                                                    MD5

                                                    7bbd62519f3b669029fefdd62d3e9334

                                                    SHA1

                                                    ed92dbf59daa539174aca3ed837ae7dfa5e426f6

                                                    SHA256

                                                    600e13f548cb88b932274e23f53ab439475775b1af6612a229d6dc65802ec03a

                                                    SHA512

                                                    1ed396791bb9a6744e2779de076529bd63e962d72619d5d15ded5e55188fad5acc786342d1c856416e27f769c59d76cd944e0a8ff69b908a1becb0baa699fe5c

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    690B

                                                    MD5

                                                    ae9d42e0343f024a0e80d54e36bd6a24

                                                    SHA1

                                                    aae30e2831714ffa2d5d4fe4e2cdc112851a4066

                                                    SHA256

                                                    f5254a96166c486c9d19cd1bba9e8a38453aa90a02b3523731562198508afd92

                                                    SHA512

                                                    486a8a63c88f281086473f05fe3940a1f666778fb2263778c20d6bbe63c3d4ec2bf69be98662010bd2d45bf24d618c83c1e6410471b4305165eeaf9c3ca637bf

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    a174e1c7148a37af51a49dfad6c3d462

                                                    SHA1

                                                    3c585ed16ba71c2e0f14a529738c8a4baf27c72d

                                                    SHA256

                                                    fc7a43d6033cf598d8079ee98acc71a9ed5de839e64b6af37b15f875885366f7

                                                    SHA512

                                                    f60c93ce6716e441eddabfc675c20ed50aa3d72883217d645862b7250e1875c22b9b07a5810165495eb2bda8012e993f9c3bd7f6f86d4d6cefbcfdd3adb75b11

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    a67111c0a93283aa73f4fbf3bb62157e

                                                    SHA1

                                                    fc3e4b583b855ac20e48e076c2dee4e8c8873be0

                                                    SHA256

                                                    12c79b8755fbd40dc41e9a889c160c6e36a324ca138a68178bff90c4c43d6aa9

                                                    SHA512

                                                    7e5ee54c2ff9943286fc635665ab787c4b899268018a91a15feb1dfa1db5c299397269369519db4fb35a6f4bf82421f1890396316089d9a9dd446886e145971d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    f3da45db0fc928b85fad8ba69416ea40

                                                    SHA1

                                                    2a0b186702533551e7d602e1f83b4519358fb9f9

                                                    SHA256

                                                    d9fc411220dde6e62b99d7a9ec71fde920cdc4ba692862b1a51b0c7a17ca191e

                                                    SHA512

                                                    cd6b18ad310ced9c48e883e18072aa4eb7f97c06f6a6db92d9a44dbfc70b1d4def82ad891e76b100d836d5214e19ea31e930bcfd0ae3d2142f4f04219bb16c87

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    116KB

                                                    MD5

                                                    909b54dedd76533e8d7fad1fea9e9aff

                                                    SHA1

                                                    045b42320013ce98baeaeaa342461c585ba8ab52

                                                    SHA256

                                                    4824599aa1bcee18d6af3477619333a403f9dbdde6ca0e1d806b5a1d537cb8ed

                                                    SHA512

                                                    589fdf3b7f158ca88dd11433f71596fca609dfd33542fd79e9cedc9dda4c2a59495414e7afbd4b2aef66d0291f57cf6182362388fc7abeec9ceaf9ee5c1cdb36

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    116KB

                                                    MD5

                                                    c834896c4d77029eebdb4f088c7baa85

                                                    SHA1

                                                    9c5636415b768fb0d9b1537f6b35c2c107777d08

                                                    SHA256

                                                    a8d2de450222ed8ec1b6cece99b9171a3aefa12914d1aa132e0f9eb3fa4dd8f2

                                                    SHA512

                                                    c1d73d4a66a06c741eb1051f52de2721d294707e949c41b6f2e6c56d68d8a506ea64f13654b5fdcdedba31f67b4fa4852d9e7ffeeb43446219d0cc50aaaaede0

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    37f660dd4b6ddf23bc37f5c823d1c33a

                                                    SHA1

                                                    1c35538aa307a3e09d15519df6ace99674ae428b

                                                    SHA256

                                                    4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                    SHA512

                                                    807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    a9a561b8e99a27a3c332a694e30cad4c

                                                    SHA1

                                                    7db8f6c2220b3c29a5ec8cfcbb324bbf70c98e79

                                                    SHA256

                                                    c7348dd9b07b3230bd96d5ec51fdabc2ba3d178b58919671e07ea2093580f5fd

                                                    SHA512

                                                    629df33fb7f0e98b48290aa1b94e68912ba74f82f25c0a8a9c6d427c941b807f642dc719e85f55eb089047b611cae8344712fc2b70af365245b4a49e65f209b0

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    c85ffee77420b3d4bbb7d6d6685281c3

                                                    SHA1

                                                    4c4441a3cb7681f842dbc8851b797704507724b7

                                                    SHA256

                                                    0f6e0f8f834f11b5abc34203beff8f4b8c47808851d8bfd0a86e8ffa8cf06a92

                                                    SHA512

                                                    65b7b71a1917e9f70df8e99c057b7b41295428cd8a20b6f108ad0182e5bf7d6df411f8dc2ad6e80ee23696f938b6236d9099ba3588c234d8e2e3d6040a5b0281

                                                  • C:\Users\Admin\Downloads\c94f12da-a95a-4d38-aa44-f7b68107663d.exe

                                                    Filesize

                                                    7.5MB

                                                    MD5

                                                    18b97324c5f586e8e25c1c4e1395662c

                                                    SHA1

                                                    6326d9e0cbbbccb928622ad5c76b82a68abc1c27

                                                    SHA256

                                                    007025df640d0fe793489d49ad8237e6a75a0d12eef30c3b395073d9b2c7f4c6

                                                    SHA512

                                                    45cfad5b391d48847bcefb22a34605d211ee1c75360dc2a0d36c2b7fa56ed753e13687525fc367b30d34535922725f9189c96b6ae5a20c1b66eeae1570c7e3de

                                                  • memory/5788-149-0x0000000140000000-0x0000000141240000-memory.dmp

                                                    Filesize

                                                    18.2MB