Analysis
-
max time kernel
300s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 21:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.28.97.105
Resource
win10v2004-20230220-en
General
-
Target
http://104.28.97.105
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133228763441818975" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 764 5068 chrome.exe 79 PID 5068 wrote to memory of 764 5068 chrome.exe 79 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 2256 5068 chrome.exe 83 PID 5068 wrote to memory of 4232 5068 chrome.exe 84 PID 5068 wrote to memory of 4232 5068 chrome.exe 84 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85 PID 5068 wrote to memory of 3920 5068 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://104.28.97.1051⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeaafc9758,0x7ffeaafc9768,0x7ffeaafc97782⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:22⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4788 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:82⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4896 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3436 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5168 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3448 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5176 --field-trial-handle=1844,i,11498983952812100608,9123058631589371772,131072 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59a55e753f69e79f1344d8d4b85a22a11
SHA13440dd798a0038ca2695425b2dbfd09bddfa1669
SHA256f4d4c5cb01071aed7a47d1966aab58200aedac54603c3ee49121baa9563c6d4a
SHA5120ce7aa402a0e9a82c2e05c7a67150af61420058240da9f82d9982d93b8cd37a9cd0379c8c8e2f7aeaf7bc23903970a4c0b7c0335df3c68bffd672d5e298e3f89
-
Filesize
6KB
MD5bd57425f4d6b2c4d2ebffa29eaadbe76
SHA18ca1acd36bd5293cc673a338999b8bc0baee276d
SHA2564e5c3223b8ba5a3e85f8e79009cc00cf028f6e16f8ac1e35fa2a4c7cf46a481e
SHA512d9a1589792d13e2f11ece926fc7b3368e98dd323bdc803e2a986dab5df8bc5e235c38e557e0126c087347f31ad2925b701e55e6585d2aeb836ba63837cdf9e65
-
Filesize
6KB
MD5fb211c349ee8a4be95f0a504bc956964
SHA1c0062dc4f8ef1577832200ba8c2e566941cc05e0
SHA256e89f3b9bf9e0dca8377701682bd0c9f9a4ac2921ed98db6b8405fd10a964fe85
SHA512eaf588eb377e9bc07e792c55e80097f75d85f9c9a89aeeb7ed8fa3d2aa83039568ccc5ded5cca491fd66066cd25a09f3fca79defecedba3ac50942c35e76f5d1
-
Filesize
15KB
MD5f565184081957bf59ba8ae1855577034
SHA19bf0c374003fa9635cb8fca0d22b138b2c25318c
SHA2569be4afb048ff22eb8f4d2d8a3f195a9921175af9edfa471f4e82282bf9953ff5
SHA512b7437f0e258ea955e42556a8f514e101299c095f25f22bbc6325e28573bd6a839553327f86bc9cf80e8018e7e2738290304f2d66626fd2a5561a5ba648a348ad
-
Filesize
143KB
MD5e8ca491fce4237c8c80f0f6c750aa9a2
SHA1d8c94893c3f227d906a6eeb634f2b2451231473c
SHA256e729ab966f46e505f7bea42c2f5092873ce3b6916538a76ac449004c46331727
SHA51275bf3b1c7323c6d9f00510a8f1a7f71cb439103b80a615b6e012a0f8f1e27836f4cff695957ddcb9ba91f700f68e811643cf107f6af316b73db2f852829d85bb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd