Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 09:57
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://25jz3udljy4vfbxqvqhudcvwlcgbovdjru7liumszua7fhqm-ipfs-dweb-link.translate.goog/excelecrpty.htm?_x_tr_hp=bafybeihyvp&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp#[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://25jz3udljy4vfbxqvqhudcvwlcgbovdjru7liumszua7fhqm-ipfs-dweb-link.translate.goog/excelecrpty.htm?_x_tr_hp=bafybeihyvp&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133236107086512865" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 840 chrome.exe 840 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 840 wrote to memory of 3656 840 chrome.exe chrome.exe PID 840 wrote to memory of 3656 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 3424 840 chrome.exe chrome.exe PID 840 wrote to memory of 1788 840 chrome.exe chrome.exe PID 840 wrote to memory of 1788 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://25jz3udljy4vfbxqvqhudcvwlcgbovdjru7liumszua7fhqm-ipfs-dweb-link.translate.goog/excelecrpty.htm?_x_tr_hp=bafybeihyvp&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa90389758,0x7ffa90389768,0x7ffa903897782⤵PID:3656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:22⤵PID:3424
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:82⤵PID:1788
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:82⤵PID:4996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3248 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:12⤵PID:4736
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3240 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:12⤵PID:1772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:12⤵PID:1436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:82⤵PID:3436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:82⤵PID:1976
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2840 --field-trial-handle=1812,i,14015623931723460390,3704011641162850640,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5e2bc6749e8ae6e0e8bee73986ba85341
SHA17a65d1dac144547d97e43d62f2a1fb7148a1343f
SHA256fe615b28d9aa5ffe7a0c58b1b09f30b91fada34ce834fa26372ba83f19574ac0
SHA5123af049214483d1844f4f5f3091050bdae45c7cacdb531f2d9e40bba3910b80dc859bca7e7e8d1e1396622027b12b78b5d2db1c9a3f4927f3a5510bffc62a3ae1
-
Filesize
3KB
MD5ca5337f5ce5922582667b0b5893dbb1b
SHA113829bcfde0f768ab9c07fa1e322a72f7e79c68d
SHA256addec64b39d3fd559cd650ecc92ba056a7150f1c6c1e5cf049fcd5321e793c04
SHA512848ad13b79c4b82356deca8af9752d2fe31776d23d393e02a0fd23b159ed974ea43043fb3b3389c0d5d372181779d42539fcb3fb11001b6317b1571168453590
-
Filesize
2KB
MD5ba870c68b60795f735d5da501850ba96
SHA1a3873ff4af2b88ce9272fe6a721e151f3a8cd9bb
SHA256da3bfd009a4b8b967cc012dff63091477093017629a1030bfdfec7b1bdec8a0e
SHA5121be297142416f9f5be3af0d149597aee3946532ba5f4e59b02f4fc1b0d67525563d204a8355edaa1c06cdeca442e0bb0e4c4f94ecc2df77ebf3369a40e0f2f1d
-
Filesize
4KB
MD59e6f6015f03261dc7e346303928ffff1
SHA1c33fab142dc30b99237d9ff0ccb36d98df53c842
SHA25609648b0ee29113304bda0c6d5dfe5fb5cfe408ffe12b5f1ef31f704071519f27
SHA51280713398f6c9a4292cd3639cb48ca68517c291ac55c11e9219e31c823fa10049fe66c9d49ea11a767e14160f9cb02f199e7c2534ffd090b8254e2f29ccbd3cd1
-
Filesize
4KB
MD5d1ccc4ceb6dd7c64f2574d03943c05a2
SHA1c4aa45441aacb9c07c1c411c31b7d0e7eff3c869
SHA256378ada4ca7dc7f429721bd3ff36db1db4b59875a0898ed6f00ef7f37b958d26e
SHA512123907d868192d83c165f463e812fa9487e4ef561dd9129581e52dfd1e219cf4ee04112603f14d3ffd0c41aa4bc7987a4799b5def9d775d76bdcc08ed1192a12
-
Filesize
4KB
MD50725a67af573725a3ab787f4b8780678
SHA18812024396e39749318246af8f2935d80dcb8458
SHA256740f360f8c4a22b9ab2f5578e882622d67489171701f8413c1c99877d9ab1b76
SHA5120221bd4219c6c832978adf2934c4b78dba761b22abddfeb94ee00ca0ceebcde31531d22cf79f746d0c7d63262105352a8b5bd928a88faa810cd2027db46d8555
-
Filesize
143KB
MD59ff958db2158771da738afbb48770b72
SHA1760fd1e8f485783a09bf78a8d22db98f96fc55ea
SHA256f4215fcf7ca6d696c4126c360ab6a0a44b222d722f12fa437c4b944c7826b048
SHA5125f2a1421e019d01361c66b8b6debc716866ffb91639f45afa42a0176e76b42b3ace51a28b55a43743156f40721c9f224df49cbe8dd92c0e3bb23b826fdd5a361
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e