Analysis
-
max time kernel
4s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2023 12:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/VCERemastered
Resource
win10v2004-20230220-en
General
-
Target
http://bit.ly/VCERemastered
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2144 chrome.exe Token: SeCreatePagefilePrivilege 2144 chrome.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe 2144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 548 2144 chrome.exe 86 PID 2144 wrote to memory of 548 2144 chrome.exe 86 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1336 2144 chrome.exe 87 PID 2144 wrote to memory of 1228 2144 chrome.exe 88 PID 2144 wrote to memory of 1228 2144 chrome.exe 88 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89 PID 2144 wrote to memory of 1724 2144 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://bit.ly/VCERemastered1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b6d9758,0x7ffb0b6d9768,0x7ffb0b6d97782⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:22⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4912 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4944 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5444 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5012 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5644 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5088 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5020 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5424 --field-trial-handle=1812,i,1680410617144627012,4838534494527321716,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD56910a46cc5b46d9d9471a5eebca05013
SHA1c8eb93671b311e2e8097b69d529e85bf8db5b918
SHA2562f7ba30490d959c692f0c3d94e17cafc7d5a1e8f0baead922610f6e98b3efe1e
SHA512b52766a77be2a0bf5cac1ce9ec5ede85f4382abd0324d328ff39585d4655685e0879a7ddeabb1382ba69081f06d06a8bcc04682b7ed91914cf06cd434cf4b789
-
Filesize
5KB
MD580a9c038c9a4b010e8c48b393bcaa64f
SHA1ce73296702a3ca7ea34487727cd3d04ed3c02140
SHA256ddefb81557d7476a99fe6a544798e8e2764bb6afd9a4301cdf07333f006b0237
SHA512b5a27272b83a0a6fbfe9f45d8d904bfaefa7732ddbe7322e2389179ee1717b52169e36b051db49012dbdaeb9444ff4f202242ef1d1df66be437e23e0313faf74
-
Filesize
143KB
MD5e9adccbc51ca4768ed6927d7ad30bd05
SHA12a233679223db911719e3259d3f090833456a0c0
SHA25615b0a08df92de63206f77cd11cce3596b0d61e1b9a8600885720152d80dd11b7
SHA51210c3da0dbe5a9070b39961093035d46a8ad443aadb2b821f1be08b3618ff984763a4b53311d8639843dd01b1db17e0f9de48c6ff8020107a113e9572f2f3b385
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
6.7MB
MD5d412e3327b84ac68ae46fa630d5d8007
SHA108339516a2e5259d7980654a41ca24ee05e1e255
SHA2567def8eda353da7150e935d8b1a57a2e8cbb6a4f458c1e773e1129c959e9a1f03
SHA5125aefa4f2b25a8c15aa2d4c9986dbcd7759ce2bf28ec54dfa9f6a1213cf36474ed20fab889cee09f488181d2fe606033a3e78454b30f79ed821cd0afe387dd7c3