Resubmissions

28/03/2025, 16:48

250328-va915aywc1 10

25/03/2025, 13:36

250325-qv95eawzdw 10

25/03/2025, 13:15

250325-qhpb6sznz8 10

05/02/2025, 11:25

250205-njccwswkap 10

24/06/2024, 18:49

240624-xgn4cazhpl 10

Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2025, 13:36

General

  • Target

    22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6.zip

  • Size

    38KB

  • MD5

    a673667a024d675ff980bb083fd0659b

  • SHA1

    1dc4af0fb817c38c7c01c7731ec8c4ca52ebf360

  • SHA256

    73c07aa4bd216ebe870b332144fa8ec206bd518823c627a29ff7499bd65d9f4b

  • SHA512

    892147ee3943a55ab766f10bd5c3c30d040b478a9b05973597bb2490ddd50ef32c1a161d5314ceabb6a9de6f39a85084f25bc00e7c1739baa2cd9e10960e8a0f

  • SSDEEP

    768:9r60vylcUdGrLHm/2V/8DgMQ2CEsbvy8MDeFdAE3Hn51+5i8OLQ5Ggpl4kb:kPBQfG+FM8rbvhFeU51OM05tl

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6.zip
    1⤵
      PID:5340
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5280
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffee9fedcf8,0x7ffee9fedd04,0x7ffee9fedd10
        2⤵
          PID:3948
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2052,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2044 /prefetch:2
          2⤵
            PID:3492
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1596,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2204 /prefetch:3
            2⤵
              PID:636
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2404,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2556 /prefetch:8
              2⤵
                PID:560
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3152 /prefetch:1
                2⤵
                  PID:6012
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3176 /prefetch:1
                  2⤵
                    PID:1196
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3888 /prefetch:2
                    2⤵
                      PID:1652
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4748,i,15947852172290378067,9887077206191022297,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4768 /prefetch:1
                      2⤵
                        PID:3928
                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                      1⤵
                        PID:5244
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:3112
                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
                          1⤵
                          • Drops desktop.ini file(s)
                          • Enumerates connected drives
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:4788
                          • C:\Windows\SysWOW64\unregmp2.exe
                            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4528
                            • C:\Windows\system32\unregmp2.exe
                              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                              3⤵
                              • Enumerates connected drives
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4516
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                          1⤵
                          • Drops file in Windows directory
                          PID:5244

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          788f00686a7ad291ed7c2d1807cc6b54

                          SHA1

                          bff8d344b930dcccfbce66faf0e2067bc81e56ae

                          SHA256

                          3c5c30fdd19b97e83e157fb470bad493f870dc7748dcf224eb60fa4e63096786

                          SHA512

                          0b7cd524ccdd9d0cdf39e02ed745dbe61235098b14263f66cb16ad870fb2156c58c336be55fb9e6e51523220d63d6dbb08ccc45fe19cfabbfce168e7d69d1e15

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          356B

                          MD5

                          918fceba2dd02c687492fe8446e5d387

                          SHA1

                          7cf4b458864b9927d5f35b76535d93e7f6de36f8

                          SHA256

                          54c483bcc5e1b7c1b6d2563fd3c17f4a67ca25b008bec327c2ad93d2e31845c8

                          SHA512

                          1fd43f1f89869a98eaf3a67b26ac8550e06ef8f2e44e4669cc981c8253b31bf710de8611709e0455790b3984ad957df9d48d42bffa28009cd688f06bdc16dbca

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          b377c473695b7d6768633ea6a043c9dc

                          SHA1

                          9ebf930f7be590104a7959fb2b51dc3d7b4662b8

                          SHA256

                          bfb14cff3ee5becae09fa221341b250b936f103c693644db452b7dab529e3e7c

                          SHA512

                          650f09a134e128b1e496516f92e1214ae091180bfe45050327a1efeb3976e07580242e66275c19d843cb99c46d1ce0b94db187739b3dc418c27476db4098e104

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          4865523dfbe62a2d17bdbcc426d6deba

                          SHA1

                          c6e849ffef3035d7e069923652f90c68f686206d

                          SHA256

                          5d511999212f1e6d398dd54480ab00f7ac2b53006d7925d2c515c429f9fc9c6d

                          SHA512

                          5fbe07cb1566867356fa796987ce8011e9333c7f1647bb61796672da514eb2084db54f07e47ba08fbd39e72eccfde7fbd60991c79733a5a5c7e724ca6e189499

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                          Filesize

                          72B

                          MD5

                          fc404d0ddd646b86fcf13fba7e10dd19

                          SHA1

                          aa8bd44687bd4fa63d5bf08165f2441c96ceb1ac

                          SHA256

                          ed975096bf388255b48c730b30323f86abba0169704e17ff3171d627c10e1275

                          SHA512

                          68a53415ccc73f78d66ab762dd121fecd6f68f9b25d605203f6e885a5b68fe62e73edea6277d40404d20f49d58f2c3b65c5bdf33beeead33d23795711eb3142a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f453.TMP

                          Filesize

                          48B

                          MD5

                          6b566855bc7edd5ffb9936c94ad33f44

                          SHA1

                          5500622a1173148b26cd83b7331ada751f979d58

                          SHA256

                          2a4aec56606ecfc22c73987882de327cebefa41d388271a24f49bea1cb116fc4

                          SHA512

                          9f2a01593e4e5b62ff1c47bf3ca38f0cd8269f4dbddff122b77cf9d591a116dd5fc66ead1ab177fdc282686254bf0cb74611502e33a67ce4f446c205bcb16c39

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          80KB

                          MD5

                          44a971ec73d067c46f1d1b2c81503c4b

                          SHA1

                          04b4655b01b4be145d4d4583c605bd26f2d9d64b

                          SHA256

                          6c1b4f38706a756842e216682673815f0db5a167e3f2a1afefcb05ee965eb283

                          SHA512

                          733031dc130ac33002181abee8909f16b9008c7e4e81c6907619c3fffe879ee9c583dc753fc83f6b7de639b8140b61ccb7e7eac86130aaa5c1a481c1aa01cae6

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          81KB

                          MD5

                          de02c97f823c57c65bd0974fb2dce3f2

                          SHA1

                          32e8272c7d642c74c4f5322aea04b105b1649ca2

                          SHA256

                          2af6660e117f1e0750320cafa77a5f19a8bb0312e2f7c9e3ceb0f3e6f04d9292

                          SHA512

                          105f33a5a93a7368322b4a6099b83743f29befc234dc86b389b330e70b3beeb275ed5ea3800193bb3bbc014afeadf5868d225b3f6f030933199da49cd91e97b9

                        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                          Filesize

                          64KB

                          MD5

                          987a07b978cfe12e4ce45e513ef86619

                          SHA1

                          22eec9a9b2e83ad33bedc59e3205f86590b7d40c

                          SHA256

                          f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8

                          SHA512

                          39b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa

                        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                          Filesize

                          1024KB

                          MD5

                          fc6c40f67b138fe9b26fb055222f7763

                          SHA1

                          5d0721663f4a8f82f7a7009dc3d81547477e6bc8

                          SHA256

                          97b90e634655400dc79c5961dd8ba14e4464238bef6eb65b88559e2a33eda5ec

                          SHA512

                          4cd79fba4dcbd113c4b33c418b4d7fa31bd3c1b6fe81d5f73f4f71bc2c97f0ed83c5642c5e33c85d92c74f8b4acfc0dfb6c5cfd6f0d02f0a424ce13cc294e136

                        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

                          Filesize

                          68KB

                          MD5

                          d76de7b3dc7ac96408481a0fcb42c061

                          SHA1

                          4d37d20cac914c71280449f9d7e4e3ccf5f674d9

                          SHA256

                          7af99c29d760e02fba2284d19b1fb570dc674d2d92eb68d1d53d0f368b2d9d5a

                          SHA512

                          de482858eab00136aa89240ae63c4c6977c8542aa768bf8c4b50bfbfda803f369c5cc4c9002b8364ad55d9e443f17747780781eee086d4f02b92bfd44bef5eaa

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

                          Filesize

                          498B

                          MD5

                          90be2701c8112bebc6bd58a7de19846e

                          SHA1

                          a95be407036982392e2e684fb9ff6602ecad6f1e

                          SHA256

                          644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

                          SHA512

                          d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                          Filesize

                          9KB

                          MD5

                          7050d5ae8acfbe560fa11073fef8185d

                          SHA1

                          5bc38e77ff06785fe0aec5a345c4ccd15752560e

                          SHA256

                          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                          SHA512

                          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                          Filesize

                          1KB

                          MD5

                          024e64ada419858df535708306f55e9a

                          SHA1

                          abb5419becb2a74d5ed4694b1a2ca2500fa15832

                          SHA256

                          da9d6caec9f58b72f36bdd9c4874664107d420d01b69d2b116ab49ab24f8ff18

                          SHA512

                          e190b1980355de3dbfd6c8d1423983d3fdcfc56c885f9c77f561259fa2e00dcafc827be85aa65cc63b399b732b848c748b5a6ceddfa2376d484facfa1c42872e