Analysis

  • max time kernel
    42s
  • max time network
    39s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    25/03/2025, 15:09

General

  • Target

    https://s3.us-east-2.amazonaws.com/archive-cloud/index.html

Score
4/10

Malware Config

Signatures

  • Detected phishing page 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://s3.us-east-2.amazonaws.com/archive-cloud/index.html
    1⤵
    • Drops file in Windows directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffee354dcf8,0x7ffee354dd04,0x7ffee354dd10
      2⤵
        PID:5344
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2196 /prefetch:3
        2⤵
        • Detected phishing page
        PID:3152
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2020,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2164 /prefetch:2
        2⤵
          PID:3900
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2372,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2548 /prefetch:8
          2⤵
            PID:232
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2824,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3076 /prefetch:1
            2⤵
              PID:5404
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2832,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3096 /prefetch:1
              2⤵
                PID:2464
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4212,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4244 /prefetch:2
                2⤵
                  PID:5104
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5232,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4992 /prefetch:8
                  2⤵
                    PID:1016
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=500,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5540 /prefetch:8
                    2⤵
                      PID:2064
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4992,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5628 /prefetch:8
                      2⤵
                        PID:5464
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5576,i,8680900025274886745,1700986091771693832,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5676 /prefetch:8
                        2⤵
                          PID:5488
                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                        1⤵
                          PID:3420
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:2300

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            c2b3ac6eff54f8de2177dcbc72c9a571

                            SHA1

                            43eb86f566ea00f98c25aff6a7693856b42cc9a8

                            SHA256

                            02aaad498ade57a92f121aa773c4f0dde1fcbc3b25199192c3614ac9df428517

                            SHA512

                            883fe2ce36fa6891297d1734f21fb18ff7e0c7169d8e1aec856761a578df1c0c6d613666bd2947f885cd60f7ac6601975bffdc7abfd11690f840243e5c72c535

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            216B

                            MD5

                            048b1a50d3646c869d3d0a0877644c6e

                            SHA1

                            84d03deaf47911faafc36da4d26d8e614a00e494

                            SHA256

                            ac344e18b66db49ce044515282fac02beb5f6c4fcca584de0c7b0b3d0c56991a

                            SHA512

                            94bcd6dce83938bbf6ed310ca54c498bb89ee064d927b01fdaa39cc112048bd6b4e8150223949cbb4513d82361078ef720d987aec376cce3f1537d493cd39632

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            10KB

                            MD5

                            7c9d583a6f2427b17bbf70c1f6bd372d

                            SHA1

                            02bb988fbe391e1ff5f6e1558eaa0ae69ea821a3

                            SHA256

                            394c71dea395ee2e1b4d77ecbd65bb4ae194123f425d30bc2532dc529759b652

                            SHA512

                            532276d466ecf8bdbf5f36964c62b5de6706febe9a6a0fd296d94ed3e4ca4e4ce74ffc4b155d79f8ee046e34d295f2417afba8862faad3a061383077830dd5b2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            10KB

                            MD5

                            eb8167452d38bd221e0db90fc726fb96

                            SHA1

                            26c2a967565b873a73b9cc3ce1384b313e1bc2df

                            SHA256

                            d595a644dfe26c788e49df3f03c389a94692035e30adbe4c8c2d3ecfda0629ec

                            SHA512

                            9d9e27bdaca6b7af8f63f82f698736dc5da630070f6ae82ce63c6894673f26309ac113a75433638354de3485ec490015e4cd29c6b2981c8a72e94856e9b7d54d

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            11KB

                            MD5

                            024abb7bb448a2193a53bc8e74cec3ac

                            SHA1

                            a56d8492677a403c9f5b09bccd5fe453e71a468e

                            SHA256

                            4baf52878002812af4d021099286e80eef8bd645fc0efc7c1fb79a9d73579f48

                            SHA512

                            0383ed8ef64aa41bce69b0aafcc4fac804752a1b65bd94f4306e7ee4b4067b10a8c85eba7dbf01afb5b1307af79482c6329f105ee33b807f0c74017efd0f9897

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            b8469d4794c4569204ca8af549b0c0c0

                            SHA1

                            d33a31fce1084b1d4a254ec3573d3acfcf4c1d6e

                            SHA256

                            3716a9d245ad9185cbc05dc231e96801a023e097313e204809d4474eea5e9774

                            SHA512

                            fa1db6846603e3e819ea50992cfebfd42c6d9e76452e759aae5ee12537f23ac6e7a150ca3d0a92765efe00b1017f2bb822037613741ea2d3593dfb87d2c79dd5

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                            Filesize

                            72B

                            MD5

                            0c6fc291ff602b366cfe1efe8799d776

                            SHA1

                            b72257c9762e973fb8d11887f7b6a82ded4376e1

                            SHA256

                            dff71bf5033ae01d5085a521cce343aceabc507eeddbd8e12ddc95b45693b30c

                            SHA512

                            a53fe9080a3d3d09b4792e061aed03a177559a437040db15d35fd8c0b59986510a54af8e85e634c6a67d8b1fdc8c38eba018313f82549f5adb5ab30e905295f5

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a95f.TMP

                            Filesize

                            48B

                            MD5

                            90c72ab7c9e622ecb53175b251ea2079

                            SHA1

                            5041977d5f39980f25fb2e4aa03622ae82d3ef49

                            SHA256

                            c8538c45e2ab35a6436c188f7fa0758884747a17e336dbb2726ad90834afcdf7

                            SHA512

                            bcac060d9ef913179cc4fae7998f3a03a3b0082113a2f1fcde5c4f379d72dbf4f55f3bf0ebc2e26154fe05b75e3f007cadd7a35294d1e02aaebf5f0b9fe4c089

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            79KB

                            MD5

                            7dcbbe50b169b0703ab42ce9e6acc288

                            SHA1

                            f7ffb56b1779e4ba02bf187466cd85a621d1ac63

                            SHA256

                            0d45c4febf19e1a15d6829d89301b55e4b16e06fa9176e92c191fae71d78807d

                            SHA512

                            e764fbb818af1573cf769530f5aa513eadf9e0f345b26f78fab6e0e4e1da80171d6708176c72d9003f55e96484bfe4c9d7e97cb15779885c0d6f760be05c7d52

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            81KB

                            MD5

                            4c2dabb2f09cc98d4284023add8a511e

                            SHA1

                            2bfa0b9a2c1a7b7518e14d870f48bbe3681e8879

                            SHA256

                            8d1fa760317c7accdb1275e8f33af469d2ff0cdce30b5c24efce37640476ba25

                            SHA512

                            666c2ad61eb06f1a24115b7164f0fdf295a4d6e72085f28daafe3cdbe2d0ced2a101a438822b95f544c0bfa50552bedad9edd81089b3691e71ba68a7b10f1a01

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                            Filesize

                            2B

                            MD5

                            f3b25701fe362ec84616a93a45ce9998

                            SHA1

                            d62636d8caec13f04e28442a0a6fa1afeb024bbb

                            SHA256

                            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                            SHA512

                            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84