Analysis
-
max time kernel
599s -
max time network
516s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 23:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://iymp.com.au
Resource
win10v2004-20230220-en
General
-
Target
http://iymp.com.au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133230534151575226" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1064 chrome.exe 1064 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1064 chrome.exe 1064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe Token: SeShutdownPrivilege 1064 chrome.exe Token: SeCreatePagefilePrivilege 1064 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1400 1064 chrome.exe 87 PID 1064 wrote to memory of 1400 1064 chrome.exe 87 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 4016 1064 chrome.exe 88 PID 1064 wrote to memory of 1108 1064 chrome.exe 89 PID 1064 wrote to memory of 1108 1064 chrome.exe 89 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90 PID 1064 wrote to memory of 4540 1064 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://iymp.com.au1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcdc69758,0x7ffdcdc69768,0x7ffdcdc697782⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:22⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:82⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4860 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1804,i,4510451213221704919,10275626551506614892,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561b52be1513e966a87f2f907fac0cd12
SHA1588be6958de86d2fa2856b8228af32ae285c5896
SHA2562ac7d6790e1ca7bd9f91795fcd36281ac9ffe9d948e1bcbd1fefbee25e104cdd
SHA5120e42672c326b12c26b07c0777e7d7499cff7b94186ea5a67eb686eec1cf7a92ed8265ad2b044716c90d00847205d3cd1bb63975730fa9273c211feb39b5eaba8
-
Filesize
6KB
MD543d4a2853faf91bdfae628daf5b107f5
SHA1681576844df70fe6f11fd38c62d2f15e3009af43
SHA25697e4f631f6fc00244573ced03f06bc976087c2c9a60c5c902c90f18bc941cdde
SHA512493ba1d860a1979732321de94415f9f9b934fe90eaddd66d432b70d9d810595d6b9d0e7fee92a82807afad0bf27c52dcb76a1646b1fed4d04a9fd9705ad63573
-
Filesize
15KB
MD545bc77c4f0cbd3dd67b604c6f5d75c4d
SHA1098a6d731eba95db15e047112f523dabb48120f6
SHA25602cacac89d8cb6bc339eba5a0b38d685053fe04209ac39c65a5da35cbd613f79
SHA512c9e2d01f6eb5df5a7e676759a662478f02b305fcb2e3176f988231931e78fdf655738911c6307ba92920d472e513d568d936cfbb33264e14948b518c48ed353b
-
Filesize
143KB
MD51837b27dedd70ab21cfc873c4801fd6f
SHA1a0b64e417d0faf8f07133a3714bda2a606e936e5
SHA25676cd4ff99673997cad31542a5a5694e8af38b44428a691d76ac04b6065d24ea5
SHA5123297e79bad02a4ac6d03ced330e8d317b40ca8eb7c596548c5d82f84ae9fe76de7b3ad09420466c1699166bd3e185bb68ecbf3c42c8e3085600bc76d30becf25
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd