Analysis
-
max time kernel
1800s -
max time network
1688s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 16:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://higedev.cool/
Resource
win10v2004-20230220-en
General
-
Target
http://higedev.cool/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133232874283088490" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 3292 chrome.exe 3292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 3316 4136 chrome.exe 83 PID 4136 wrote to memory of 3316 4136 chrome.exe 83 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 2912 4136 chrome.exe 84 PID 4136 wrote to memory of 4856 4136 chrome.exe 85 PID 4136 wrote to memory of 4856 4136 chrome.exe 85 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86 PID 4136 wrote to memory of 3712 4136 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://higedev.cool/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb99df9758,0x7ffb99df9768,0x7ffb99df97782⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:22⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 --field-trial-handle=1808,i,6553856677771297226,13362421486534668838,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD591ee70c110dd3b6903ba94062cec7d54
SHA11653b38b78a3727742dd4726f35696f1dfde6260
SHA2565e75e0b4252b2164f39ba8ab730b29dae1ee8373d5793bbbba4422644ea5bd35
SHA512d51a1a98e3efe87fbe8086b78ba5d000311bae7c40ae3559a9ec8422071491ea28e0e0dc6f80a306baf1f860e290317b3bd92dabac2065f3f54bf0ae25ed0f0b
-
Filesize
6KB
MD5b34edade08f34656eccf549bd4928e90
SHA1e130fd756053c579ab37b358f3eba32654fd0e55
SHA2569eb7424867c7f27cc0bced8a677460a8bc1a1e935da1fb1947a52e8d48ddc583
SHA5123f006135992c49d9890f4661ed6b0866acc61eb1a0307430d33beb7315bddd8ac720ffbb01d1e164e338c15242da048bbfaca8e38bb8b1b891a812bddfd53723
-
Filesize
15KB
MD507924ca09a7de02934f5d4512ee9fad3
SHA18bf510de68c3ec3fd7430ad62caa6f184252429e
SHA2563b0636f1d49e6416568832a8c1e4b885e94af5d4cd556d05dd90fc1f7b993ce4
SHA5121bf652a0b00fca4cda9e3ad18a0630e4b16fcb5c93f926537eec8936599531676f97e0be337e35cc8c69f13b5b75ca75b37c51a34b0d62dc6c2d3f35fdd3b675
-
Filesize
144KB
MD568ecd57fe92087a92d352120a2c92d6c
SHA18d8473cfa696951c26e738eb266726b3cc45ca9d
SHA2568c01e8ecf11e20a3aaaac823b159c0a5b53402e191289082875498a71d5ad0ef
SHA512333844861f38caed8a1e4cdb4f7f4631159cf28caff3ae7d700e4e77031cedc924072406ccc07d4425c66846ded2929503f3fd18c0db155798c2c41a023d8f19
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd