Analysis

  • max time kernel
    111s
  • max time network
    114s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/04/2025, 14:29

General

  • Target

    17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.zip

  • Size

    548KB

  • MD5

    e1835210a12753a043c0079efc2dc26c

  • SHA1

    19a8533f7f163b23bdfbd358d3a29557c896517a

  • SHA256

    9d3e402ea8bba91daf61c40cdf1d0e8980bc527041c272b6089b194adc423b47

  • SHA512

    d6a0107e08aa8a31baf65e91fa8830e7dc74a9d85256b94a42d060be02514c35d05878d4cd37d0210690be809d9f60797d427a7ff768d931c76b3190d1f050b1

  • SSDEEP

    12288:wO0Ph+HBBczMcQttr6ntHoi6SktdheKQL4J9I50yFLRTj7:nOshrcQt5GtHo6ktdQKQLy9I500j7

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\17d1f9551ceb2dca9e0e2d3e494d35a5d010c3c491728719bcdf9c514a6db785.zip
    1⤵
      PID:3512
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\FormatEdit.rtf" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5484
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0x88,0x108,0x7ffbbdd5dcf8,0x7ffbbdd5dd04,0x7ffbbdd5dd10
        2⤵
          PID:2444
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1836,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1844 /prefetch:2
          2⤵
            PID:4892
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1428,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2232 /prefetch:11
            2⤵
              PID:4860
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2376,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2396 /prefetch:13
              2⤵
                PID:1440
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3236 /prefetch:1
                2⤵
                  PID:3136
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3464 /prefetch:1
                  2⤵
                    PID:5948
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4124,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4156 /prefetch:9
                    2⤵
                      PID:6104
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4640,i,4044800451175219570,7928647901138735387,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4620 /prefetch:1
                      2⤵
                        PID:2748
                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                      1⤵
                        PID:1988

                      Network

                      MITRE ATT&CK Enterprise v16

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCache\data_1

                        Filesize

                        264KB

                        MD5

                        f50f89a0a91564d0b8a211f8921aa7de

                        SHA1

                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                        SHA256

                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                        SHA512

                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        8ea99d2803575935356db215b60cd585

                        SHA1

                        9b9e9219d4af954b418f1a90cfd5825cd152dd77

                        SHA256

                        227ee944fb54b44ade53d5ac5ecec45468ce8fd1c021b6e882712f828c6d41e9

                        SHA512

                        cc32d27304e99cfb78e954e1263e35afd439fcdd92e34aff9cb6de7eabaee1af83b3bee2c8c51aa4cf97d9e343f81e15a32b991e039742f1c02b26a39a28a1fc

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        356B

                        MD5

                        391836a0f4e6635921102d39a396e626

                        SHA1

                        5bb3d0ec3550f348a3f09cac2f8c23746b38db24

                        SHA256

                        7973b2e682e8a4d8caedc80a86e8c0aaa4cf042989b8cd9f1d5abbcea6d3f611

                        SHA512

                        d52af1bb4fd1777bac0e4c613d83fe6ddbe361105cac60b766ded97c18514368b03c156fc33e6db69193ab9f1aa08534e4f3aa789b49b3022ca34bb94b2e1fff

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        5d8834480390b7aebb539d5b81b9dddd

                        SHA1

                        539aeb8a503a60f02988c760974845d072424563

                        SHA256

                        8a40fe807d076392ea9ec61938b9daff6eb287033cd6dc266b6aa9473ccc4d16

                        SHA512

                        fe2611a24ddaa6e9d3bae126056c49ac5cafe7ca3955b66a8f293c22d9fe22cdeafdb8101c318ff788c4919f61231dbe80d7ee6ccd3cf5bea0c8239b994f6894

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        eebab84524ada6b11bec74ef3b554a3e

                        SHA1

                        a8ee6890df96ad384238a3289a026d2c55affd9d

                        SHA256

                        df5b50bc085da09dc89536fc118eeb3415e5316001315555370003d63479c72e

                        SHA512

                        bc87d844be774d51d93ee6d56653f792aa9d81ec4d35af284c580adda3d05252ce500fc208098f12e160d9ac0233222134513bc0929c3f1b8cad0e12ff6e429b

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                        Filesize

                        72B

                        MD5

                        fe176fa75b3e4837dbc3b78f1cafb4e9

                        SHA1

                        4e455a0c0b170b012be16d1aa595a9a30655544d

                        SHA256

                        8781c55822af1e9ff19ad3c9e33cf1c7ac02594a27f619fb5416ce489584bdf0

                        SHA512

                        9e8eb9c379c2356ae541b726740b24f8e933771e2e7b7c4066669e3a1b5b7b9cbf20b05969e6f4761536a82e9d3b393fc9cba2bf1076d6c390f74c8a749029f5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58678f.TMP

                        Filesize

                        48B

                        MD5

                        bf37b14ae2c71c377cbfae944682582b

                        SHA1

                        bc78308da68a3644c95a83a3769b07b805c3a2f1

                        SHA256

                        aed935735ddd550aaa7fce222e454948807adf3dc568109ca757c0661c8211eb

                        SHA512

                        1a932c25da5db46380c803e834813ee25db66d890da81bd4721846be5be34e03a48c4010e2b8214f17f60f5439f8d01650fd4fd15366ed4d02049fb53e231a1c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        78KB

                        MD5

                        502e6f6938bfb05eb7b7aef1f5e3c222

                        SHA1

                        61bbf76a62c8c8d0c549696872169041d4329865

                        SHA256

                        8f60b8978cc1d3f117e7043a19d50ae8620b66223fdaf5c531a390568fe15f75

                        SHA512

                        62516a400a62e69a2ce97138f183c2a2c6db7a9109a8f1786fdc7cf4dc247ba29f917b004c7a412e72aeafab4ce0b2b0ecbc23bb5c73ff386ecf6b046415550d

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        79KB

                        MD5

                        c9fffacb691c5f011f726137baf9c077

                        SHA1

                        945f00472340c973bfce8dd00bf40ab2d4cffcf9

                        SHA256

                        d96a7f194435068011210505ad84eae3f688d75fff5392b54ba1322f757a26e3

                        SHA512

                        48ec47ee0554418124911e61937ed16074cfdceb4672fdec2cd0b137a132d9863a140a3ecc7a839ef2df97bf4d4b6a6424c435c371c7ce8fb7009c5e8fb45551

                      • C:\Users\Admin\AppData\Local\Temp\TCD2CF3.tmp\iso690.xsl

                        Filesize

                        263KB

                        MD5

                        ff0e07eff1333cdf9fc2523d323dd654

                        SHA1

                        77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

                        SHA256

                        3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

                        SHA512

                        b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

                      • memory/5484-11-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-0-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-14-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-15-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-16-0x00007FFBA6200000-0x00007FFBA6210000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-17-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-18-0x00007FFBA6200000-0x00007FFBA6210000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-27-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-28-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-29-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-12-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-9-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-10-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-13-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-5-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-7-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-8-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-6-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5484-4-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-1-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-2-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-3-0x00007FFBE8BE3000-0x00007FFBE8BE4000-memory.dmp

                        Filesize

                        4KB

                      • memory/5484-663-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-665-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-664-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-662-0x00007FFBA8BD0000-0x00007FFBA8BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5484-666-0x00007FFBE8B40000-0x00007FFBE8D49000-memory.dmp

                        Filesize

                        2.0MB