Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    30-11-2024 06:23

General

  • Target

    (Full Package) One Click OPT Ver - 6.7/3- Browser/Powershell Chrome Installer.ps1

  • Size

    313B

  • MD5

    3bebc384e2431863e9e54481b3238f09

  • SHA1

    9f2dc65ae513bdfc7a249e550256e78a65484b1d

  • SHA256

    ed6038dd65e1d797cd257f51193494283fbc81047ff215494ecb85c516b0fd3c

  • SHA512

    c57a19f7d081f2d599045cd5f40d310055ffaa53d6cbda62d0a0f25593b9b56d4d38566094f73fcdda88567cbe40e56de0580bfa90abcc8c00f0e13125ed6c94

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 24 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies data under HKEY_USERS 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\(Full Package) One Click OPT Ver - 6.7\3- Browser\Powershell Chrome Installer.ps1"
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\AppData\Local\Temp\(Full Package) One Click OPT Ver - 6.7\3- Browser\chrome_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\(Full Package) One Click OPT Ver - 6.7\3- Browser\chrome_installer.exe" /silent /install
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\SystemTemp\Google4580_109070342\bin\updater.exe
        "C:\Windows\SystemTemp\Google4580_109070342\bin\updater.exe" --silent --install --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&browser=0&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&brand=GTPM --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/enterprise_companion/*=2,*/chrome/updater/*=2
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\SystemTemp\Google4580_109070342\bin\updater.exe
          C:\Windows\SystemTemp\Google4580_109070342\bin\updater.exe --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=132.0.6833.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x298,0x29c,0x2a0,0x278,0x2a4,0x1429488,0x1429494,0x14294a0
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          PID:4524
  • C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe
    "C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe" --system --windows-service --service=update-internal
    1⤵
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=132.0.6833.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0xcd9488,0xcd9494,0xcd94a0
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:568
  • C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe
    "C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe" --system --windows-service --service=update
    1⤵
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=132.0.6833.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0xcd9488,0xcd9494,0xcd94a0
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:1036
    • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\131.0.6778.86_chrome_installer.exe
      "C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\131.0.6778.86_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe
        "C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe" --install-archive="C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Network Configuration Discovery: Internet Connection Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe
          C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0x29c,0x2a0,0x2a4,0x25c,0x2a8,0x7ff70d365d68,0x7ff70d365d74,0x7ff70d365d80
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:2448
        • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe
          "C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:3844
          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe
            C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0x29c,0x2a0,0x2a4,0x278,0x2a8,0x7ff70d365d68,0x7ff70d365d74,0x7ff70d365d80
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            PID:3132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\Crashpad\settings.dat

    Filesize

    40B

    MD5

    4b6ed6d42999b8b9b39ea093ad537ff1

    SHA1

    d1e90c88e56ce55f8e9aa2c68c014db666b1cd91

    SHA256

    8cce818afa7917e780448ac877cd616478b4660ab4480ad39ca25f81a3719db7

    SHA512

    256b4feff0620758e6a6733377fe2cea3043794d351f468b5083de361e10b841c7a67d43a69d6216910c0f2a07913e1862d10a4220191cab6e29a61e2f8376fb

  • C:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\prefs.json

    Filesize

    19B

    MD5

    aa2d0c0c72bb528cf4168ea91c1c9a56

    SHA1

    67be5a0c29b13b92dd86ba935f605c4ba7eea2cc

    SHA256

    e03e9d262ca3b7d19e37c3a69c7d8b46bd3f5542aa555a17d864071c28257b2c

    SHA512

    6bdb9a72b73f11f7627e6fca0ee1d417201b038cb255d445dd29e5f27de08e99a6c4729c4c893ffe97e4bc1835532879c47cceaa051f07b3cdad06ad17b2d5e7

  • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

    Filesize

    499B

    MD5

    074740f90496d7b54de743d9e1a6eac5

    SHA1

    2d674cf28eca5609aac3731b1845f4cda3f4e2ba

    SHA256

    d25f689bb9f3714111c30c4a47e1b25f25c6567984ddf55e26866e88e13b5e23

    SHA512

    69cd94b738e8550be339f9e5e81e1c6874e7ab9a210a291ab30f79575614788ea97249a9da562ba1b9b390d0f5d5ebbf7af27d63d863615d08b8dbcef4e2a15b

  • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

    Filesize

    354B

    MD5

    101edf2f84a2258ad7e9cf372dddbd9b

    SHA1

    a6be3ad21758d97517b0954b10ce37a6f2554066

    SHA256

    5215b9c80aa31ee907655d9731cf9971ad9af451f6d6ba390054b068fa325b04

    SHA512

    7b36ea507c3f50a081dae06496724f86ff45aeea833dfed8457a56aaa43f5b8fc0b1b802253ca60d0933afaa9f5b38115427ecf81e42a3893d3f29f36d8952c8

  • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

    Filesize

    598B

    MD5

    b44b56e43edf5b1fefcd9ba6febce4ce

    SHA1

    478ea0a804d9f262c1bcc962296a2919cd4d4754

    SHA256

    63a0af0044f9611affceba434b53a3310578349c1f8ab843a8930378fa43a4b9

    SHA512

    e8a063c1215178a53675db20aba9b16ece57261d42515c120ca09fd72c967e2e6aa93886595d185ae2f6a714bbe9b916c634c2e630476ec42dfb4f913462101f

  • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

    Filesize

    49B

    MD5

    88bd7c8114993adb9d7903afa0a526c9

    SHA1

    63a74433d467122d5e9d0028e9d686bc48ca1afc

    SHA256

    bb3c4b90702246fdf6c3698037de42bf1949b5028c354647aa65024373f341a4

    SHA512

    5a4fc0f483b2e386fa69faff6dc5d60c98024816dc42127dff2e15abe162ce112a798f44cc62640d966955c0994fe85d2d775e7e84be45cf00687770fcff8d15

  • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

    Filesize

    1KB

    MD5

    fdf3c5d5ff28f069ac1d417dd6ff05e2

    SHA1

    e46cf8a26a90004cfacf355de66756c78f7ea207

    SHA256

    f5a46dcb2ba5161909e11d92e9adf5f2bb182e2ab4974d5d932ce654e03c8d2d

    SHA512

    cfc58060b2b73b29c0bd65865fd080446783c0da494f2f4ee69330d6e22f573dc783bed7b74a98de3edef5285b74318975784aed3de5019b03b5bdcb97c93565

  • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

    Filesize

    1KB

    MD5

    1f455ea8f3e95281ae6cab8cd8c7c5fd

    SHA1

    a41630142ca8bc1fb52d0d45761da158a1f057a2

    SHA256

    21db2d61dbddea01e1059a37cc3122090cfc7a4e30b3225312064104d9e1e040

    SHA512

    fc1a6e88cfffc34e016697962f9ad02393dbf3d303ecf9adc6643cf3fa37dbc79b4399dfb51573cd0de7762e575b4c1b45eff4015420a5723f04fc3b84bc07cd

  • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

    Filesize

    4KB

    MD5

    75046a6b6a5e97cd6cf5bc6a67321908

    SHA1

    2232ca96bec16c136e5e03ffd7236fbcb0d1ce58

    SHA256

    e04caf875e454619969d8f370102e6da8e0f8c1320d2115506b077bb6bb017b5

    SHA512

    eafde434081b69f8b51b44759668e2fe7354810c3dbe4c988b46d1199933f9708e4a38dd948905463386e53661f08ee39a16a1bf2c19505676af8710eb9aebdc

  • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

    Filesize

    4KB

    MD5

    cf2f3fff9e50b83c276c879ac2bcb007

    SHA1

    395de7c60ffa04868b396f73c9db04f4893e1485

    SHA256

    7e2aeddffff20a0ef34fd83eb03ef7bb0b5e3e647dcf972e8e36fee549aad3bf

    SHA512

    53fc71ee68b43166925196bca741e6b075f96e83087103d988a51c101712e98f1db6e8a5b2c2d06deedccaa36e7e9537d27e22a2ae5bac7041b67398e1febe14

  • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

    Filesize

    9KB

    MD5

    94581f4498713bfdd3d373a74643fe9b

    SHA1

    832f80b38147c86a54788474800a6f1438b3469f

    SHA256

    4848ec32a165d9f5234d333a93def73a3f9ce01730ccd6e83d1c86e654244c76

    SHA512

    120d69e19bfbf1bd4ed6c077a0daf64ca5ec700ddf90491b39d7c192b30402d2561853b8b23de20f1f7a94daa892e708e901b11b76c1ee01bcbff65629ce220a

  • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

    Filesize

    10KB

    MD5

    654707dfabff6f123185db226277edb2

    SHA1

    0def3cad96013dbf2eae1e7d81604af935be2191

    SHA256

    2a79c16c5a86d2fc453e24da80d4acee7d031dccf15febac7897dbc3670a44f1

    SHA512

    ce0ebae91d521cf55109d3bfb7da71fe3b7ea5d2e888a22d1c1746213e06e9c34758b26128222386fced4b4aed61be41c486d0891bf859d33ec4b08980e19546

  • C:\Users\Admin\AppData\Local\Temp\(Full Package) One Click OPT Ver - 6.7\3- Browser\chrome_installer.exe

    Filesize

    9.9MB

    MD5

    8bd480d649fb57853326f0398298f26f

    SHA1

    a84ea4875f352ed7f70590f55f041a8e22d8eeea

    SHA256

    0be343504bffe1d6c757b5c458813615e0fcbedcef6c5a62b39b40262887f68e

    SHA512

    c1e874aab76abaef66726ea9d5dda388961f39adb708a85356063a8757caec6192cd0c5914dee398af2b6749aaf045b7413e487ff7b2e45a8be43870f9253255

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3cpabxy5.ijc.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Windows\SystemTemp\Crashpad\settings.dat

    Filesize

    40B

    MD5

    b277bb512e69e91914b5082a1cb7275f

    SHA1

    4ce640c282ce34d9c7335c72faaab26d624d188e

    SHA256

    ccfda22afac105e3fcf9bffe7d9086d9476660b497937a5b0f809b0f4f897a09

    SHA512

    a7c106aeb0a45855fbd642bb8762f15eaae48f43cdb026a6d810242c8c4f18f8468f159e4ca96213650fe80eec1060a61c7e855c3d030cadc6aa7f07a322e8c7

  • C:\Windows\SystemTemp\Google4580_109070342\bin\updater.exe

    Filesize

    5.3MB

    MD5

    9db9d09b6a58e5c09773f754504ac148

    SHA1

    7cd31865c0858319128bbd2483c19f59b7208cea

    SHA256

    c294551059a85542127811249b8e725d3ab885efdd4996b201db588899769e85

    SHA512

    80a036cc6d42e72bf6be634c6134945750da105ab7e026c2e53e0a02362db3101acd9402b0383bcedc9dfb29b3a87cb0951191fdcf4d29a780d5380c6ad6a05f

  • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4080_286603731\CR_4C79F.tmp\setup.exe

    Filesize

    5.8MB

    MD5

    288b7ac41c7aee8f1eb192faae30b665

    SHA1

    5c48a395de873d25313a7b1a6191a7a9fb0387fe

    SHA256

    e92a14f9bbe4da7405002b4803740d69e96d0a29a2944513d503b89f2faa46c9

    SHA512

    880e087fa5b3cc8b758de49580a6c8821b3dc7b52d9c1fbb077268a1042df85ae4043a73b14586c60f82e0af483646ea3f10b1b7f071535a5bdd6f73bb77353b

  • C:\Windows\SystemTemp\chrome_installer.log

    Filesize

    21KB

    MD5

    6fe46d9feff69b5005da4bb4ddbc7443

    SHA1

    dc461ef0674ca1bd1fb8f5f1f336187d4682c146

    SHA256

    cf0bd01c904120eb02b411aae6870869868191696574302ae02b4ea6deddafe0

    SHA512

    34ce09cad7d4fc13fc9c89547d5e7b53b41e6f77667982ab33b85d2fefafa28560d8beb3cd1095c3bf62fad202eef38e969a98e1970ac846a7414f26c87fe819

  • memory/776-13-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-14-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-0-0x00007FFCBFEA3000-0x00007FFCBFEA5000-memory.dmp

    Filesize

    8KB

  • memory/776-15-0x00007FFCBFEA3000-0x00007FFCBFEA5000-memory.dmp

    Filesize

    8KB

  • memory/776-12-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-11-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-16-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-17-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-18-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-19-0x00007FFCBFEA0000-0x00007FFCC0962000-memory.dmp

    Filesize

    10.8MB

  • memory/776-10-0x0000026A60AA0000-0x0000026A60AC2000-memory.dmp

    Filesize

    136KB