Resubmissions

09/03/2025, 01:58

250309-cdv29swybs 10

08/03/2025, 06:55

250308-hp35xatjt9 10

08/03/2025, 04:53

250308-fh1ebssky5 10

Analysis

  • max time kernel
    300s
  • max time network
    296s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 01:58

General

  • Target

    My-Skidded-malwares-main/Megumin.exe

  • Size

    585KB

  • MD5

    42290305664ed813bfa8ca2e19e95c0c

  • SHA1

    d995102a7f80134526c915dd59351628c91fc2f4

  • SHA256

    659d0b6efbf8aa8eb49a2e1c6ec9cc5e33f2617a607f2bcf7a70465febbd5744

  • SHA512

    8ddf065acab28522f6cde0698b769f4078e167c9bdc1e88f6c0974b21668c07d44e4c83bf7a1863b1837b782213e04e59d07ba2cde6bb34f7f159d1242bec5e5

  • SSDEEP

    12288:1Dbpr2trUqUeBhfUHzXC+cHJ8XeSb++MnaT2v0:1DdsrsG5UHulCXR+xaT2

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Megumin.exe
    "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Megumin.exe"
    1⤵
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:180
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks.exe /Create /TN CustomMBR /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Megumin.exe -BypassWarning"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4808
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff85ba2cc40,0x7ff85ba2cc4c,0x7ff85ba2cc58
      2⤵
        PID:4592
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1804 /prefetch:2
        2⤵
          PID:4740
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2132 /prefetch:3
          2⤵
            PID:1904
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2436 /prefetch:8
            2⤵
              PID:1796
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3156 /prefetch:1
              2⤵
                PID:1536
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3396,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3408 /prefetch:1
                2⤵
                  PID:1204
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3684,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3692 /prefetch:1
                  2⤵
                    PID:4128
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:8
                    2⤵
                      PID:1436
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5048,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5132 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5028
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:348
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:4164

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        ffafc3a89523efa789e20a4239943d77

                        SHA1

                        f63af3324879a3119a715046b9ac2a862019191c

                        SHA256

                        676428f5a05e17ea8e959f223370bdac2daebcd20c419f443e4772b8e71a24a2

                        SHA512

                        53d75d0f7221f0b17488faca4304534a3f4dde2ad57d6f6675b0846c88965dc7ab669d067493449ac80c0fd389dedf546d7d1ea5035cbbe533a4980c9a2583b3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        9e031db0aca7c28323b2254f591c0694

                        SHA1

                        4e2641c8f6ae27c55dee327fcffe101536eb7968

                        SHA256

                        37cac243865761edb9b4cdc6be959b073edda01eebda9b498b1070e950621f3d

                        SHA512

                        45b12c620c5ad46b23cc08e22f4a2535acad44741531cc923821fdaa43cf01332ca082adcab2956d456727bb1e3066194c1faa8e7244a6bff4bf9ad7b52d3dde

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        8KB

                        MD5

                        f9cbd154ce98d15bc6215adc9ddc9983

                        SHA1

                        eedc67a39ee60e7ad3e979332e6a84b519a015b0

                        SHA256

                        112ccb5c13da51d97b0be5c4af3e1ec29bb5948a1a3bd027580994ca0e2eba04

                        SHA512

                        b729b8e230d3e43e45fcababbc3872e04c64a0ad3e4978618032903ad0f64d39815a7c5b37ddff2a33c167b38f27132e156a8bbb38913e0a256f8a266fbbd08c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        53eb26f97f5c75db50812bb40090cda4

                        SHA1

                        631abdd506d57449138cdab585355a75fc6e3e40

                        SHA256

                        35c34b55f5a1fca3655ade0de6d7ec7ea7bd06d1f91cc8f80666056c4e92b7a1

                        SHA512

                        907493b428f83ca4e65ec7407bebaed46eff56d5170882ac7e486a4277382c9589d285d8a53ea2da141652597a4a4a580c109635aa82bb3fc246b8d4f02c69f0

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        1429c90b5a09d4a58404a50c3b0f7f09

                        SHA1

                        2ffa308518e99a5ae0b1c0a69c410e64605a56ad

                        SHA256

                        9139da8ff9c32790e458cb890aac2a3900c6eb4062b6f2b977d2f3201d0da652

                        SHA512

                        0ab04b16003fff19c60080f663acba1d5fa4f7054a2ceade2c43702122e8fb14b7f79812be1b212170c89234f4be040c02cd1de0928546846101e9c07a7a4f39

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        138a3f8e29514f15cddaccdfc823ee81

                        SHA1

                        49ab84315532f0a5c86c1326c65cd4dac94de980

                        SHA256

                        61c6bea55cb30def6ccf1614eb4e9886448568dfade036063452fd8dfe0eafa8

                        SHA512

                        2f2cb2b9c5300a5f6407b270061a28c363fd85301822d4854b197cd087310ec1135a820a99ae1e1d6dd435c25ebb07e0be007ac995b20a38cd170fa97e972e7f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        04c217709eb76c3da3d4e400f30d069f

                        SHA1

                        3761bc2e97ec4ad13067c0a6e9827a3f216f9a53

                        SHA256

                        0a350640e1413b1bcecf5539b75c93086fb8b2396218112e9ef7e8867fa988a7

                        SHA512

                        1adf6f720bf1a8ebd38be9e0af71b2612f728cd642ab60f2d0068be763481b12d114cd76b35c5cd12b672a19107842ea01018cc8bf465c27905ba87591d91da7

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        3d1534265c5213b15fcfb2ab36681e9f

                        SHA1

                        0ae22adbbe44dc6e22dae527de1074e801c425eb

                        SHA256

                        e17b661737e4a91e91299cea6104e9e5d68c7f36e3756a186c758356ca829d47

                        SHA512

                        f8f35929ef9d5f0ad2b1d7d73bfcfd55412d69ed0e2d095081d249ba6cd115fa92d56ffb88071478ac691b2234c168990542fb3eec7b5ece419a6c1755a48d67

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        8KB

                        MD5

                        e1b8bc6ee3c9a43704552f36a27b306c

                        SHA1

                        da6c8ff327dcbbe718d54d4ea405b8367586e304

                        SHA256

                        e1c6b98271fe2482f58c166d5c596c24939d7f1d3a46caebcb8349f0511544d6

                        SHA512

                        0ff83cc3baea53960556d86bece21e3a0db55a007ceaa773d45df4eb51da964b290bef56804a251678acbe9051e0ca57d233803fc85cbe230305f976426e87cf

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        970c7db69af38ac6fad74c39f437329b

                        SHA1

                        76e97ab37823518d18ba20f046058266cd7349df

                        SHA256

                        d8f87d1aff87b74f2eec27a97c22c86df6b2d3869c4d2ee0d337f53cf56365d0

                        SHA512

                        0aa0e53eb7e7c2aefbd2a15b74825da8bc5c677305ae514fdd959ae951c60ea42f45cf170a84c963fce4399b8133d7d8a8eff2fdfd8bd79bc864f1f1bc52b60c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        77e870c8a239ca6bb2003b93779dd421

                        SHA1

                        b0636f80cb1c88f91f532bca1ccafdef20f2d07e

                        SHA256

                        dd0ac0177bdebab5a3b3e12e95090da4125449fb2e78bf4a4cc75f46170cb64c

                        SHA512

                        5203b72a543bd2a6e0be23326bb4282937f0529793d0821705ac3f0e1edcd4662f3396fd1a08c0d950159a1191ad05a4e7fd5ed3cd32b826a18139e1a4ba3dd2

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        c0125f13a073532f4ece14055a8b6dc0

                        SHA1

                        374c1e821ee5a1f7041043d4d2e1a04e66874d42

                        SHA256

                        598c2ef020860b10440a8c69864eb30d6bea518524db572ac68cf24e4747e026

                        SHA512

                        9735e5c70f7f5658b96b6df976cb06337417aeb3349bc5f91f1608b3cd77a638273a717bcde8fd9dd147fc7edff74de58e42d24254e2fe099acc2bd4ce1407e3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        123KB

                        MD5

                        11496deb8c2b18db4617a6b070b90b3e

                        SHA1

                        ab130ae48cd467063e5f735f3c6117770f04f30f

                        SHA256

                        bf9cdc24ed69b8cdaa3daa2a97711c1646c6c326ce0e6365b31df419facca820

                        SHA512

                        1a69165e26f06491bbb97cbfccc233b76100c7421958be66dfb4daebe347870fb85e32ebcd226619026f96a4e2d871c85145bc27a37d7b22696787c2107ada8d

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        123KB

                        MD5

                        eac5323979d7649cd87f2bd203888e5f

                        SHA1

                        213993c069cc9d5934eb1dbd40335ffa01c81679

                        SHA256

                        09157de1b73392c739f3bee017e38b99d68640d141a204702b2afd483a628bf3

                        SHA512

                        5b9024e32647b2e18a2baf75c2659490f97234361a2704e66eb8c29b6c912b0532d07a60108f8b4da6211c77431f4f85d189569b9b0abba1961a06402fe018e3

                      • memory/180-0-0x0000000000670000-0x0000000000671000-memory.dmp

                        Filesize

                        4KB

                      • memory/180-1-0x0000000000400000-0x000000000049A000-memory.dmp

                        Filesize

                        616KB