Analysis

  • max time kernel
    37s
  • max time network
    43s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/11/2024, 14:58

General

  • Target

    http://tr79.sov197.emailiq.net/188863/1392161779/38146690/15/0/l

Score
7/10

Malware Config

Signatures

  • A potential corporate email address has been identified in the URL: add-to-calendar-button@1
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://tr79.sov197.emailiq.net/188863/1392161779/38146690/15/0/l
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5944
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff924a0cc40,0x7ff924a0cc4c,0x7ff924a0cc58
      2⤵
        PID:2092
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1796 /prefetch:2
        2⤵
          PID:2852
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2040,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:3
          2⤵
            PID:4992
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:8
            2⤵
              PID:2080
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2988,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2996 /prefetch:1
              2⤵
                PID:1140
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3000,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3032 /prefetch:1
                2⤵
                  PID:5956
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4228,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4288 /prefetch:1
                  2⤵
                    PID:3268
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:8
                    2⤵
                      PID:4680
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4736,i,1222256902761438780,15899069300550681740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:8
                      2⤵
                        PID:3420
                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:3564
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:1844
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:1892
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E8
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1524

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          31ca100533f3288c27650fd7ead334c7

                          SHA1

                          6917f5cdb2af7bb171d7d6a9e2a908129f8a9a69

                          SHA256

                          db451e38604f03449e27c99370ebece29deae65ea806adbfba733019e679e855

                          SHA512

                          bcea74cc9818180a53d71bc7becdd0571f0e2b5a1e1ddd6a1b30dc21850fdcc00d64122efdcc050f406c2571bc0725161185257d7ad374daf26f5ab4bb069ad8

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          691B

                          MD5

                          c98172d7e6a51ea4bf8f31a839fe3eca

                          SHA1

                          9083135a0ded1c211912f13c7cd00a9ea4e70f34

                          SHA256

                          97de58ca3d7b46da5595725bcd404f80c8cd1ce84e8f9a26d7d7b498c631dcd2

                          SHA512

                          4f6e74c301fb5c5daa5acbbf650abec66ad91fa2e62a57176ced75ec81fc2e3232d0d91d0e58e3587b16afd712bad512b369a4263822ffe741e8dffcf525a548

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          e21371ea3cd07903ae9802fe6bc19a62

                          SHA1

                          aa97c1165348150a77d5a49cf5df72ba8927cdf6

                          SHA256

                          2ec96df1bcbef4fe44187218931bd3d1ab1b62f5cca9d6bff342b801b876685f

                          SHA512

                          1ce253a741a5731bb4fc507fa3c83d6cb07f7b1eef59f8da0bb4804c7e3817fa2fa983940197b011aa7fa67f4183c2125b796c920d7d2f2c39faf5bc6bb5da49

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          da4d69105eb79f6fd352dcf8d792c060

                          SHA1

                          06aa643f7d5f55a34bc7052b46b0afe8dfaf15d1

                          SHA256

                          ed053f4ba944fc40e656c4acdb44035645891ba07654482f1477fa63fcdcca11

                          SHA512

                          b9d933ddd4282d7e1239e4a50c242d019e8e80b3e29727adfacbda2fc285d7b83857951383902f61cb21918a0afaa31ef58e3430af1fefa2338e8b1a927e6a43

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          228KB

                          MD5

                          1cb5db759c2fffc1cb169d56afa57905

                          SHA1

                          7322db36881132844ded0c35a3e62d2dfb43c378

                          SHA256

                          11c472dd37b57105b1d349f1fc570970aa2154dc2a61876d610fc6fe7029bb1c

                          SHA512

                          ff9bb37fe9ba8ee16812637c4fb793348d251c26c99d85563f26b20cdeb4064d672350086e17bd020467bd7cf869badc5ecceb910e595561eaf4fcae059c4026

                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                          Filesize

                          10KB

                          MD5

                          71a6b59e08e25451e52675c842fae23c

                          SHA1

                          565a97673954a9209c7a05fba20b89d10b88025f

                          SHA256

                          5b96212d3d1347b76c8c1c64b2f7ef981242bedd3b84b766b543d56dbbf8dbd6

                          SHA512

                          5cc98eb2aa02e2e69165170451d89dd880893e6b07440bb84fbab6cf92cb558bd58c2235d8d64ff43d380c5e9869827800d310ee67950bb21b498d89fbb5aab3

                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                          Filesize

                          10KB

                          MD5

                          ef4d9165f280b4d556f349f896b81ce9

                          SHA1

                          ddfe1709a292d9900687d4fe0b4c8b2429d848a3

                          SHA256

                          8add12630f4210146f1c0f543e34f61810eadbb6759b6eb3a6303337155c9cb2

                          SHA512

                          e8b2c08605f8c3c9eaf0a8f905e65829ea2ff4e0d45c79f171ff685e80fc74e4f7858b4975fac8ebfd4dc3b21a14fe571e446889d4022400e84d8193053152ac