Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 05:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://6338d531.ihorad.pw/stream/2dbd9ece-1cf3-4a03-ab29-732bba9809ba
Resource
win10v2004-20230220-en
General
-
Target
https://6338d531.ihorad.pw/stream/2dbd9ece-1cf3-4a03-ab29-732bba9809ba
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221249711910553" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 1568 chrome.exe 1568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1792 2700 chrome.exe 86 PID 2700 wrote to memory of 1792 2700 chrome.exe 86 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 1572 2700 chrome.exe 87 PID 2700 wrote to memory of 3380 2700 chrome.exe 88 PID 2700 wrote to memory of 3380 2700 chrome.exe 88 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89 PID 2700 wrote to memory of 2464 2700 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://6338d531.ihorad.pw/stream/2dbd9ece-1cf3-4a03-ab29-732bba9809ba1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90cb79758,0x7ff90cb79768,0x7ff90cb797782⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1016 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:82⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 --field-trial-handle=1716,i,14133340138640311623,8835476882782775888,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5181d9e6677a0f83dd5de0bf04b2772b2
SHA1d1f7fc596ada0af452250097a8f83b7903105edd
SHA25688ae965d28cfd2529a6e19c33dbe3beddbf079541770ad3ff7e72f776aea16e4
SHA512c9f4ba6d6d8824d51faf7dc62e311e48893093fa42380adb5040fa7ef905c5b7e85b66d07694c38505efe1f3edd8fdec3642db978339c09d9aa7fbbc8859ba56
-
Filesize
2KB
MD57fbc854be376ae979f5d641cdf486e32
SHA1d9051d4c3c99ae183264e304bcfea98bfb40896c
SHA256c6eebd2928813196351aa86294a922c0c7e098cfc1f7711197f804a8260f5ffd
SHA512757e2e4a04e3c7c0d7279404cec727a16360a0b19607e8f0665db54494035338d51f49070559f47049080ca2edb3990e34e6aea3dc53889578f4829e43d66a64
-
Filesize
2KB
MD5d75868c27f66968e954d61226af0c2e6
SHA12a5119256b3e1d9d55a6f98ad0439ac0a7b8c5b4
SHA2562f6cce9c2680d28c5aacb28039742b701c1178d11a1b5bdbf21f0d29cd9b659e
SHA512964a54afc9d91a84f8deb343285ea6db6179ec391d7efdc8b89bb919016e2489343eb8ab7a2b4e8497784bd75da0d828d67b900d5536e97a707899c0b4c9146e
-
Filesize
539B
MD5f9df087e785e218d0928cbc6af7d7b43
SHA1f9c97fd44928a3ff3fdafc4db1c58ee71ccb19dd
SHA2568af6619bf3743ee83dfe72281b118755ee06f861865c2584a9b16eb03e17fe5a
SHA512369ce5f82971da5c482808b383d841ad34a407d662bd320d4f6d5e8f5070f2c7ec7561dd0bd8f5e7352746800dda99a3e1f27912f3f7ccea4104df935bc38aa5
-
Filesize
4KB
MD5aa5841bac6878640cddafbf1cfed18c2
SHA10dc2781b117c79cbab3deccfc4331b5803d44b38
SHA256ab554172ec6627989bf3b46dabc652918c648f05d43da99ba3475e2dfdf13995
SHA5121a2d551e5719b282ccab96726efe9d013f3485f78e19775229db8f8a1728bef0d1b4e4e6e8903476c1d8f6cb5f1ff592930d12fe7bde185d5f822efe3e664475
-
Filesize
4KB
MD53e74efd091bd8e8c957974103ce0de0a
SHA16bfd121dd8ab22a80374f1f2a3287756041a53bc
SHA256484dd80db33bdb52995cb3f17620745f39aee28f3ad8d9fc86b3830191a82112
SHA512d1b4b03a29625893d9ef5921dde8ada1649aab9d97bc4cf30e074f98b025d2e0d80da7b8f0bf4a965787fb2577c6beb750918ae7abe2f1afdcfa4fe10127f312
-
Filesize
4KB
MD5c0e49332f0e375b44288396637a70d5c
SHA149e653555f5705efd67843df62c60ef57e824fbf
SHA256bbcfb5d1aad39ca526c5c8bf09f7b97a1789aa485ec2cf28ef8c0746a264b23b
SHA512bd47c53a568f042e018007327162106b593ec97112a728184d41ce1c5f436c8b50e5a42f6c8370941fc56d237ee22a00ff33cb2ad937ac5578b97407c5d44f2c
-
Filesize
141KB
MD5f6b7052726d025379dde5fd5b9323ed1
SHA156ba9d1857654fac783efc6be52c3d97d9ffc75a
SHA2563bba5f4daaaa97e2b303fb841267f75281db19f961e8ac74dc7d8a49994ed6f0
SHA512193ba274309ed6945504f56b170d082e2aee9161801c5a099960281b36095c3d03a228602a5c9c1fd909cfef58dfca727d189d5138180f098dffd4670d8061a4
-
Filesize
97KB
MD53108a1861cd2bb0cace0c471466251ed
SHA164155eeff42f4ad9094ef06ea09e4e6bd4fada18
SHA2561d0c34300235c64e1f034da297e35e6455ab3914d6e652156b2799e7aa9990dc
SHA512963cbe208a0616ce1b533906550618141a029ba6015da3834cfcea566d02fc667173a83626adc0477e57dafddf66a626dd8c258f2fa993802f9d0f0ce6cadc2d
-
Filesize
101KB
MD5798dc6afd9bc59357c01410d949eee2f
SHA13c36599100e93f4b943a9b8d0e89f2ddf241613d
SHA25670ebc9ceb7f1ba67f2beef8e5dd1b59d6408fa627f74dc627ebfa6ae7f59f0e9
SHA51289724639351a5f1a232520f290ad7830855fe09c711c3e3083d3cff8f5c0ecc205f80cf6c20709d9bdb4648a3c79c6ba7bfacc5a490def64f7881f6e6cef7284