Resubmissions

21/03/2025, 17:52

250321-wfz9jsvsdz 3

21/03/2025, 17:45

250321-wb8ecst1d1 10

Analysis

  • max time kernel
    155s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/03/2025, 17:52

General

  • Target

    hookfor60.rar

  • Size

    5.9MB

  • MD5

    645eb7ce7ffa114153dc1b67fa157d8c

  • SHA1

    b900c6f09c33409d844fc19c7aaa309e3520bb0f

  • SHA256

    77f155b8f6e0aa230e69aab203d4cf3f2d4323a30c4e876bc9ca9f0cda11ae21

  • SHA512

    26d62f9dfc65e40b56ff3ea950b0c50dec852062f236252636c6b0e78c55a7feadc29ee5f88f27f042f6ed95850a64be47bfb244fca173ef8d10e39eb4d85588

  • SSDEEP

    98304:HhigvY/b2Hs3EWLYWrr0hslpOgiXfH/ZMjadCet7UKnPnmQ9mKMWZf+oFX3j:HhZvQqs397rr0hslpOgmffZR2KnvXR2E

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\hookfor60.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2984
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\system32\curl.exe
      curl
      2⤵
        PID:372
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xfc,0x124,0x7ffc585ddcf8,0x7ffc585ddd04,0x7ffc585ddd10
        2⤵
          PID:1472
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1896,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1892 /prefetch:2
          2⤵
            PID:5480
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1588,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2272 /prefetch:3
            2⤵
              PID:1700
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2404,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2420 /prefetch:8
              2⤵
                PID:2740
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3156 /prefetch:1
                2⤵
                  PID:336
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:1
                  2⤵
                    PID:3624
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4188,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4208 /prefetch:2
                    2⤵
                      PID:3564
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4736 /prefetch:1
                      2⤵
                        PID:4484
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5344,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5348 /prefetch:8
                        2⤵
                          PID:1780
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5552,i,17700888560903366986,15407727621726537438,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5564 /prefetch:8
                          2⤵
                            PID:872
                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                          1⤵
                            PID:3668
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:4792

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              2e77ebe71cc56439c22a6270e3049682

                              SHA1

                              9d88f89c1d41d39466452680d694c457bfcae354

                              SHA256

                              be4c3c897518f80146a226db77521ad5d3876d177f0cd241ae18e1712901c730

                              SHA512

                              050f3a3d0db4041748eb5f9732dc086a4d37b81ed97f3592b4619aea9456b17e537c936287234ce443b8fba8ecef0d75d7b09ee202ea546aad30ee8bbe6a4bae

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnWebGPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              b5ab2b3ab9c363a09bc1c9190abbff29

                              SHA1

                              1411717fe83c0d86fdce4f6debe160816b8efeaa

                              SHA256

                              0ec7241393704c30fd49681ff9bf5d706094e13536fb9dc2e654c57eb8cd7207

                              SHA512

                              4437798b503aa0a0fd4949bfad2ec04efa57f11d3a160c3fcdfa060641dc1229854a5189e94480d72ae791dd70eec549a59fa509140d0a9996dd0c9c36ea15cd

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              356B

                              MD5

                              0019378c861ed76aa0741e7c642324f3

                              SHA1

                              715105e040e5d714b9fdc92abfd8b6f80781ee14

                              SHA256

                              4abcdbf81062ababd7f5bbbb84c5a7d5fb25f1395527733004f47a3aab70efdc

                              SHA512

                              8f321fe97e04a8353f86ccc78627251e162c79a173af08039acfdd9df946cc4dac559b7b433213850496b376ab2813066e8c44e43bddcd982cbfdd25d1f95560

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              10KB

                              MD5

                              a2a6dcc73578f2d60ee50637244789b1

                              SHA1

                              f11be2954fa97ff781f289adaf128f552a5ce3ba

                              SHA256

                              cdd6bca451bf0a63a48fa620f1654d095599cf4c7c8f22fdca2087d059b5d095

                              SHA512

                              4ddc7a882fb301745097d901db99518e38272f6fee8cf0bf7d013848a5f7b90d9f32a4bb8252aed1c80b0821f8243845e95698e35acb92c118bfa0a3f0a080db

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              a73d514daff437ebaadd6d5bdc9baea6

                              SHA1

                              cf6d2e3aa1f384a598293248e600b7d5370d7f28

                              SHA256

                              0fadd861882f4617b5c814604d34349bea3eb269f92ff29cdef11c21cbb22904

                              SHA512

                              7b18a6b40e7b84e4ffb76e9de0ce579facacbcff5f7de0f3f67db68f1a4f816fc3e2db257e888f69723f617f94492c64ebe1e6cb92572af18a6e8e4746eaf42c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                              Filesize

                              72B

                              MD5

                              d4c8805565e1edf56e68c88c911bf974

                              SHA1

                              e7bb3412efb13868f2c46728d327a33be214cc49

                              SHA256

                              f11e55756bd95123aa3c451b06b1ee8256057f91f9a0acccf7b6761ddb4c3e05

                              SHA512

                              9b500ac03c9d750febdc3ba2c5edf97c6021ac258f50ccd65c44c18a6d8cfa8705e88a7770dd295b94e8fd4f20aaf4f5809230477c664e758c195a904dd2737e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ecc1.TMP

                              Filesize

                              48B

                              MD5

                              76e9049bef5e20dfb56ff48d74be083b

                              SHA1

                              ceb8a2179d790493a81cfb9f47a6609f51162e55

                              SHA256

                              a3ccb4aaca98e55131b7326470323755eb4b20313fa1a8bb50df1fb12c327a84

                              SHA512

                              bfde6f951fc8298555b50cfa83491ac0fc5ae749f0b36f3993e14849108b50254e458fab362cc1501c4aacfabc8a3f35f298994228c0a8e8d0d480e4c45b5c88

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              80KB

                              MD5

                              7cf9a16ab5e517bf1bbddd4c51da6adf

                              SHA1

                              599fc4a64c7424b8a23e6efb4a3b8f03ff8dd8bb

                              SHA256

                              b254edb60602178f25c9020ec6fa9d026b0cc4876fa8cc0cbfbf3a0e625d14df

                              SHA512

                              e188eaaa49aec5d3babc576b687e7d91b0dc778cb10e914a0c2f38b75f1efd0abd06aaa1b6e982887d341d6a9a90105984c84d158d925bf29a8533188c83187b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              81KB

                              MD5

                              e5155ee10d885bdcc55eb1ff0b5eba72

                              SHA1

                              1f3dcfd1a83ff6382bce33b8619c5ba5e9bddcf6

                              SHA256

                              810ea148744e47b4999bbc7785a9a2614562ab937b15ed0e71c66bb882f63cbf

                              SHA512

                              0f925681d79af6f1ec063c66cf578a387736eff7e96093a62097ee35ec511ad5f3fdb5646d5ea425e5399f5b9fb1e740a92ea10423214e382433eb519d428ff1