Resubmissions

01-07-2024 12:16

240701-pfe52svapl 7

01-07-2024 12:10

240701-pb8a2a1bqb 7

Analysis

  • max time kernel
    40s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240508-it
  • resource tags

    arch:x64arch:x86image:win7-20240508-itlocale:it-itos:windows7-x64systemwindows
  • submitted
    01-07-2024 12:10

General

  • Target

    Loader.exe

  • Size

    12.1MB

  • MD5

    be541590b256e77780bbad1e932accde

  • SHA1

    e9bc9cab5fce4c5840c840b0296cff2bcbca41cf

  • SHA256

    7a217c82459cd9a3d6e190410f511e1c534a6fd19d32f3c5f47baf6c02d807dc

  • SHA512

    70c14058e21a9599892afe0054ae302d362e55d0b78ba2d7b68426dc22567d4c6288c4f446aa4fce18c811c7e12ee357c02f3a0f7581588f5bdde5efd8bbf852

  • SSDEEP

    196608:kmJXyrAQq4Hg9x84FMIZETSwjPePdrQJYQTLBpzH2gYx99Fitn2P3k/qf:psA8Hg9qQETSwvJYibB2Hw5/2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
      2⤵
      • Loads dropped DLL
      PID:1412
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d29758,0x7fef6d29768,0x7fef6d29778
      2⤵
        PID:1636
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:2
        2⤵
          PID:3040
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:8
          2⤵
            PID:2936
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:8
            2⤵
              PID:2920
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
              2⤵
                PID:916
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                2⤵
                  PID:2088
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1284 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:2
                  2⤵
                    PID:1584
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2228 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                    2⤵
                      PID:2676
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:8
                      2⤵
                        PID:1716
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3380 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                        2⤵
                          PID:1532
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3044 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                          2⤵
                            PID:2596
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2420 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                            2⤵
                              PID:2780
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1632 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                              2⤵
                                PID:2484
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2068 --field-trial-handle=1180,i,3899484430766218336,1169103580579769144,131072 /prefetch:1
                                2⤵
                                  PID:1376
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:780

                                Network

                                MITRE ATT&CK Matrix ATT&CK v13

                                Discovery

                                Query Registry

                                1
                                T1012

                                System Information Discovery

                                1
                                T1082

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  6KB

                                  MD5

                                  dfae54e58eb02cce7e5017621c72ef5e

                                  SHA1

                                  456265597d6536b62a41549897dd93f5cd1707f3

                                  SHA256

                                  5a821f43a60b0352f937e78593875d6fc66d129d865a182c3af9b280d4d32b9b

                                  SHA512

                                  570ead927649cfcaa399537ef2d3856a3e217f8b12755634f59e7a1d540d581c9e1bb2eb86f369850188747c4bf6d21a3220b693bc2fb372be5ad76aeacdbe8f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  5KB

                                  MD5

                                  df7213cc8f8da28337c282da57adc35d

                                  SHA1

                                  77001784624d6d9ae72c305cfce556a994710028

                                  SHA256

                                  03b7c4f1478bf10c284d6c4810d424d4456483fbeb128ea58fc497918b64f240

                                  SHA512

                                  103c3aff72152333e6d42054dbdf88b7162bb0075ad3c64e7bdce8dc2e9975a32a84594b67c11d723f185b84ac0e45f259f55823cb05538bdcf7852b875caa75

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  6KB

                                  MD5

                                  c8d08046496981ae2155b65b18ab7184

                                  SHA1

                                  cd0fcf3ba3aa40123a9651a4445e484c9827f211

                                  SHA256

                                  f5ead2319652c31e539cb09c84db8f4d6c9621e2295e8a895994febf4fd5f443

                                  SHA512

                                  031e6ead9efa66c7b4f5218760537fbe607545fc94dc9b5d55d00e4a1914051b401ed50c4219f1f9379e4776c4c5c28be8030edc3e652065e44819a1e54223b9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\api-ms-win-core-file-l1-2-0.dll
                                  Filesize

                                  22KB

                                  MD5

                                  8d1531275b769c1bd485440214bfaf82

                                  SHA1

                                  c8bb901b148522595cd78f1e12f61730bfa3d9df

                                  SHA256

                                  0b7a730b6b10c9d2e2fe1b9b4419b1fc60db9074a0c6f830e1b2da4d0f65fe88

                                  SHA512

                                  55914f424c400208b0d2c4d6cafa355aecf4697d3a6bf4032fe298214ed3565013c969b1e23d91cdf995dad46760c80e3a0a3abc062b3084b2bb4bc83a90995f

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\api-ms-win-core-file-l2-1-0.dll
                                  Filesize

                                  22KB

                                  MD5

                                  50d07886dd9136e8da57bfde8fa1f69c

                                  SHA1

                                  17526cd01e870d4087c5aa423e4971c72882e173

                                  SHA256

                                  67fd0522cacfc3f5fb90373dd5fb388b6f63035d9a380cac4a3dd3d7801724ed

                                  SHA512

                                  7d1b12529f35e1bcd7a858fef4001a4a5e0ff15506789fb3ce56b58427d16c32a9c1768b87b2f66a1b37456a05f8e05ae0b0eddfb4335ae0cb8eda00550175c0

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\api-ms-win-core-localization-l1-2-0.dll
                                  Filesize

                                  22KB

                                  MD5

                                  ab169047e1a0fcf3c98be20b451cb13e

                                  SHA1

                                  a286836c85ae43ed5c79b9875f97abdadf57b560

                                  SHA256

                                  3cbc6f8cc2a014c9c6e87ca05dd0e9e0884da58afdc53b589b3d7172c4403ed7

                                  SHA512

                                  c8e27ebd9335f7f34919e841f9834fa687f822d4289b47c20283e37f4a499008668bafd12e1f742597a6c8623312fc41881c18a56b9062a2a609dbb55f0cd17c

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\api-ms-win-core-processthreads-l1-1-1.dll
                                  Filesize

                                  22KB

                                  MD5

                                  5132f7fe729791081561426904d45e76

                                  SHA1

                                  56fba2baed4123bf4be7be1c5344f95e6bd9db9c

                                  SHA256

                                  a5aa6755860602c58c0edb1353c965e6f0ba58e7276ba6fb5a0b961fb274d125

                                  SHA512

                                  b12e981ddb608049456dbfc0bb77350819f42caf0da457ad778bb9ded3979503ce6713d366547ac3f949ebdc01d0775da1d726fd367b11b8680a472017f59cc6

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\api-ms-win-core-timezone-l1-1-0.dll
                                  Filesize

                                  22KB

                                  MD5

                                  1ee744ceca8da8dba0dc27f25125242c

                                  SHA1

                                  4c168b8673cfabbbbcf00195cf0db7b640a0289f

                                  SHA256

                                  c67dd8ed74c0a207c980caa6bb453e62180a71af175feeb42c2c926ecb911e0a

                                  SHA512

                                  d17b8f1419e3f77729c686d4fe79feb08368953e0997ef67217e829456e1c13dde5d9e7a0c35d117d1ae4d40f37e160cb6390b45242c0308d809dfdadb3155f9

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\faker\providers\job\es_MX\__init__.py
                                  Filesize

                                  83B

                                  MD5

                                  eeaa6ca5cb7f4bb1d7e75797f9b5af37

                                  SHA1

                                  0ac3743facacbc2090930b41cf38bcfe2951eb37

                                  SHA256

                                  ce99db30f577944104a7365372ea8363cd9d0087a6e9d88f7b835a1926da336c

                                  SHA512

                                  b492e6fa3eb607683a6c6f5696835aeae5e4c12fd2d44346bfd954d25c0bcf5bda808c175b0b17e26a0d5daf4f91d8588de119f5b747a80b3cfe53f68bbecd7c

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\python311.dll
                                  Filesize

                                  5.5MB

                                  MD5

                                  5a5dd7cad8028097842b0afef45bfbcf

                                  SHA1

                                  e247a2e460687c607253949c52ae2801ff35dc4a

                                  SHA256

                                  a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce

                                  SHA512

                                  e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858

                                • C:\Users\Admin\AppData\Local\Temp\_MEI21602\ucrtbase.dll
                                  Filesize

                                  1.1MB

                                  MD5

                                  28146c66076a266e93956111981cad4e

                                  SHA1

                                  44797bab4d3d3a8ccdb9df3a519cd3dbef838c31

                                  SHA256

                                  ed570898508c9d9186052157106b6dd9722bed47a27ecfeb424386c8970d81da

                                  SHA512

                                  078c8d6595b0afcee215a44ef9caa82f990ef2bf5dadb8fd84d83ac89839abeee1f9ce250e80b77cbbdde5d13688ed345da1f4bf22958490e645c074d2453f85

                                • \??\pipe\crashpad_2340_TEOEQGNOTJFYIUHO
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e