Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 18:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.topbuildersolutions.net
Resource
win10v2004-20230220-en
General
-
Target
http://www.topbuildersolutions.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133227767491627250" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4376 5056 chrome.exe 82 PID 5056 wrote to memory of 4376 5056 chrome.exe 82 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 4916 5056 chrome.exe 83 PID 5056 wrote to memory of 2664 5056 chrome.exe 84 PID 5056 wrote to memory of 2664 5056 chrome.exe 84 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85 PID 5056 wrote to memory of 2888 5056 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.topbuildersolutions.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe74339758,0x7ffe74339768,0x7ffe743397782⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:22⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4632 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4008 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5128 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2968 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2840 --field-trial-handle=1824,i,16881216909420612784,3493478999728787540,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d16d3371d18b4c6d9e30738161d13cd2
SHA1ee242acf6186e378be0c8c62aa1144d3a57e1b48
SHA256fce17257ae4f905596632cb4cf681dc4c301e81976a457411f4b76630d2c6bfa
SHA5122646b02987bad42afb7e706a79e2b1cbbbb0e6857acf778f68345d507bbc874dd61a06d2fd92dbb4d21efacc9deef3fa8471500abc62f992e17118cdca8618d5
-
Filesize
1KB
MD5eb4f5540f23971e4ba726e7fc4f8a151
SHA10b26bf66329c4d624bd2b091783b3cc48e6bac24
SHA25668f1a5ffbdde3b895c0836d5d5e24b8b57864f4b6d6c38d3a51c8ba2bc1f8f9b
SHA512b0ef0a686bceaa77ceb28d280f5418cc552515c41632c95afbdb6b1a7001034c0454b3b9ad47a8ea7a0f5cc5e1366f45594f4a262da18d9f9832e047fdf67411
-
Filesize
6KB
MD5c0b67b441e9e121118a17aec2a758931
SHA19ad1aa942330584daa90162e85a78f3bc8903bdc
SHA256b3f9e4fa3cab0f800f4dc2398b095ac5d442edab0cb8c6e0ff2c002ea99ae164
SHA5129b9a0c86c758c6ab343ab920446033a40bf0d001fd16e124a6be6a1a83111b2d365a9f9685bd195e8f5cf57ec118876a5c959864700ff360b6bd75d16a3eb807
-
Filesize
15KB
MD5c79099347666d423cb73456a5922d390
SHA12a0f2f131dc845d0f5082660d5a10c5b193cc799
SHA2569524a56e2656972e3ebc40bc83f47643580fb90de1458c0aff70a9b94952369f
SHA5125d2e67e9e868263cb15bb0d19f9857f82f80847debb961262a8502a70dbcb446e81c77f13c5a88540aac4291ee8ff4b665e193194c335337e92bd571c10411b9
-
Filesize
145KB
MD5d1406a242c1e69a9b950f2b476d9c690
SHA1f5ccafdaf734583159deac398765b0052805c55f
SHA25698c3066137d0ada8c409f33f42b073edd0b008a6b3ca252574f524de11a3731d
SHA512d067d19baeeb02298630c39953617a258d39568486ab3911f80dc6790efcc679aacef24c46ed9fcfb197667964b3c25d08fd0789c58f8a3097a32f2c7aef6965
-
Filesize
72KB
MD5926af4331cc0ebbe0d27148ba220db22
SHA1c4340aa03632a68093a4c121def6c8988953c7e7
SHA2566384a429c1a4f76654c5f957130c24480be0e394d0760490b4ad1e37a04a5743
SHA51280ce9045131cbc57602801c4a7344a9f439ff95f35833b842a3d3d1c6fcec9ef4a3eff27978b753c0ecfe8ef56899189d04ac7f2d632db256a99ef1ed4500193
-
Filesize
144KB
MD578089d1a2e15e96a04f0a5529b2978a6
SHA1656b5b1797f5a2331ddae6ec3c22acd2e5b8883a
SHA2569a76b13eb3406ce7089a6c48b2f816379949d10f321f8131956d5486b2f33cd6
SHA51211370374bf8a2afcf450f84d18b3fc2cd4c5e2006031aa59924331a78ec9a068428feffcdbf52a098f55881aff8921b666974b6d94f91fe5f2dbadbde27caf54
-
Filesize
145KB
MD57fe80b19a36deb0a22d644fcf2cbd25e
SHA1349d039bb7cd61b9c7bba2189b12d99d5b5e4bd1
SHA25683cecad9b4249d0aad925c1e77a1d82364aa1a532938e32621e2dd28053e880b
SHA51229046750405f212202698df5185f47ec3c5ba627d09c0f139eae45638e186cf1fb20b050d930ce062fe19cccc16ff4fa27d3cc6fe51be2e144dc5e690bc018c9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd