Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 06:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.tek-r.ru/
Resource
win10v2004-20230220-en
General
-
Target
http://www.tek-r.ru/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133232511739133686" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe Token: SeShutdownPrivilege 3972 chrome.exe Token: SeCreatePagefilePrivilege 3972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3720 3972 chrome.exe 86 PID 3972 wrote to memory of 3720 3972 chrome.exe 86 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 3636 3972 chrome.exe 88 PID 3972 wrote to memory of 4388 3972 chrome.exe 89 PID 3972 wrote to memory of 4388 3972 chrome.exe 89 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90 PID 3972 wrote to memory of 2612 3972 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.tek-r.ru/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac9d09758,0x7ffac9d09768,0x7ffac9d097782⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:22⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1812 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3904 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1840,i,13319369208949151655,10607736299044105049,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
6KB
MD524be10e96166ceea65dffcd98f8eae18
SHA10968ab3fb31695ca739d8d3fd2d8432c67c23e56
SHA256847df6fb02843b0179c0a2407c1ab834f31ba0a0524dab61d0fb2e88b1fb793f
SHA512bef3a761b339882de0d426d1f538bf4c8d0016aef116790bac2a33a976cebff22bc0276b85edbc150cb979293eb383fbf5fdc954d98b40dd1ff906524494a63a
-
Filesize
15KB
MD5b51241c64b5d33cab50ed45429d99c73
SHA19558a012ea5aab757e6d377e9cfd07a93861f532
SHA256aae818e729ff7fcb8691ff673be7e36d10fe9bda1927042b865bdc8ecc67395d
SHA512dce4ecdc86375d29ba8ed95a854af2acc82d0b5a6f82e364484880868a4feedacd0f7e3b3f98293356e06d05239ad0e563d9b10610e7b81e62d2d93b96bdc893
-
Filesize
144KB
MD5ff388a31363d123084606ba9511134c6
SHA1bc27fbbd0ac8ef12e01cc4afbc5a1152c9bd2ee3
SHA2565c9db9a43533e34aeeb203552c1c7defdbb22ee803ac9c358309f0b223c9260f
SHA5129645daeb39159b8095f081bcd5e65477e2f33778f4af9e581679931549c040d87c8158adfe2b95254fe5222d823c1e68c0516d9bade50f8d76851603722a2869
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd