Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 01:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://smartpixl.com
Resource
win10v2004-20230220-en
General
-
Target
http://smartpixl.com
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234062211331406" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3864 wrote to memory of 5104 3864 chrome.exe 85 PID 3864 wrote to memory of 5104 3864 chrome.exe 85 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2732 3864 chrome.exe 86 PID 3864 wrote to memory of 2236 3864 chrome.exe 87 PID 3864 wrote to memory of 2236 3864 chrome.exe 87 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88 PID 3864 wrote to memory of 1760 3864 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://smartpixl.com1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb96539758,0x7ffb96539768,0x7ffb965397782⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:22⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:12⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4844 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:12⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5384 --field-trial-handle=1824,i,1597308161470216809,2629554293264927827,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD567145d1dd8c7201ad506c8734df41708
SHA19f10d87858deb8ee394d47a6268494905ee9f0c0
SHA256e0ebeeb232953726660519b937e1cadaf1cb2461e8c044044ff2e9a481f085a0
SHA512cbf26927e90100331eb8cb94bbf4da6ab431e7dc4919ca6068e672cb07b2d938351d502770433707e98bbc506297fa221dced4fbaf3af92d281da7d18f80c95a
-
Filesize
264B
MD5985390a9584b9424aaec5a4acd15a29c
SHA11f5f0a6c0c0df138b25f952b643c190649708c13
SHA256bc187e4ef078acf5f3f90e0a54d18826fea64bbe229480c31d3dd4b7a4f79db9
SHA5124031d4d0d0c70f14e21aec64a81e7720505be155a0e78f391bdaba5f6ef15c3923e37c1461b51fe1de80319a75100671f7a906ea80cbd237f8efd0f49c9bfca5
-
Filesize
3KB
MD555c9be7ad338324d6fff6dbc555c9fa9
SHA172d03fcd74416a9b3c97ba4e6af257ba4032c145
SHA256335f330532f6206d7a2c02e584326a32c0fb0d2d234ecc4798f120fc8bae72a3
SHA5126b50d700ddf58ee2e9ff3dcbe7454ee431430cc39055dbbb3fe960b80095ecd57331eabd67f0625d86e8a92d5048ea814bd47402890944b652febea37df5cd25
-
Filesize
1KB
MD516f06b26f913a957093f6b07427ad16d
SHA1796907a91334e1563567ebc268471948b4c44e97
SHA256411b6f8df188f0d4ff14ff00ab33060dfd93b4433889d5d2a7cb91fd2047e20d
SHA512ee4a98f6af577012e5e4af838a199868f8eccb94e19914043e27d56deef312cc1805c4f0409e2d9c0105482df8c696b6ffdc4e3957cf1d70b8787d785c941beb
-
Filesize
6KB
MD5978d229c09e68c37033d1b4e58a557d5
SHA1623202e13d415e8dcdd14eb7c72d9f4408f1ab3c
SHA2565db4404e65eaa049f890e98dc9ac0f992d70a1ca986e91a29d472492ef4a22c4
SHA5121abe205923ab9685ad6550bdc041dc6547e2b093fd23a9e51c28269219857acb531a6959311115a5d7a00941fdb7e7ae924b619c2e6fce4bd5174ba127579ffc
-
Filesize
6KB
MD55b442cc0c10eb27ecbe06ce70e2e8f6d
SHA1d1e0ade3aac5108e4818118f455d7e03654434d1
SHA256dfabe9cf1886b0941d48c38d0fb94aae01f29886c90329c9da01671d90049061
SHA51233aa0ed8c3188e380403d418ab1e817c3173d0ac2adec3505dbf50d5568e618561d2032244aeaeb7e08b23cc45c087c0621bfbf30a0872fdfd5e819c98049b74
-
Filesize
15KB
MD52dd5ae2000c4176eda4eaa6d92fd1596
SHA15bdf508f0fdc6e10eec5ea08bc258122ee251b49
SHA256878cc669a6b4d8d3ffeddb271cbe573da155b7e20538867534c7e0896831a2fb
SHA512166e085087c39ff6f16abe962fc078ee0f56ba8ffd36a162a1a3aeb3a4a306a4028223a696dbd5a9ee388241cd6898928315af9b9e61205c14e604aebf59fa2d
-
Filesize
264KB
MD5cb52fede05f798f3d80c5eddfdd3484c
SHA13312e26215a445a60d81ff48041da230bf7a6058
SHA256390b7d7b0004a6dd7eec139d305cc4949890929414725cba205eba5c232ac206
SHA5126dfe3b7f5333f595e9a4b6697b1be76418404de17170f26330b4534d1886affb2e92cfccab031be0d0a0d972f0f2af75d935b123e4a5e208ff0bcacda6c7adc6
-
Filesize
142KB
MD5032e4678b111fbe3eb62746ad3e4dbae
SHA1285fdc86f3c8dac37fc616cf4882e13eaf0fa015
SHA2565e04f24971167b511b527ae18188e8b59f71921b0500c2e111a0df2f2f5c6a60
SHA5127bdad7c927c8add922e74a95da13a62cf2ad770e6061963bcf4f752bcbac5239ebf288df8d75f8e4c8c99381ab2dcd7f8f2cbd345f0918556820c0b62c42a08a
-
Filesize
142KB
MD5dae890d808af139c303d29c6c90285ef
SHA1b5d20bec8ba794501953de2a25f24a4197a2de3d
SHA2560c95a0164ac8fbada21cf8ce0b64aebdcf211597232ee8d497e79017c2b95028
SHA512ea692529b5549e7c2a5603b73540297cad5c6c3e2b3400e8954a868b6c09e6c79f8719a52249fd027d08cb054ff1c8ec0f6484820b68c322ca77afc0e8837999
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd