Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 23:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.24245c6781d847a1-ae67-b2f801fbb0d4-ctx.org
Resource
win10-20230220-en
General
-
Target
http://www.24245c6781d847a1-ae67-b2f801fbb0d4-ctx.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239191619706743" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4228 chrome.exe 4228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe Token: SeShutdownPrivilege 4228 chrome.exe Token: SeCreatePagefilePrivilege 4228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe 4228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4208 4228 chrome.exe 66 PID 4228 wrote to memory of 4208 4228 chrome.exe 66 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 4312 4228 chrome.exe 69 PID 4228 wrote to memory of 2184 4228 chrome.exe 68 PID 4228 wrote to memory of 2184 4228 chrome.exe 68 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70 PID 4228 wrote to memory of 3552 4228 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.24245c6781d847a1-ae67-b2f801fbb0d4-ctx.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffa9c2c9758,0x7ffa9c2c9768,0x7ffa9c2c97782⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:22⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2752 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2732 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4416 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3168 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5052 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5180 --field-trial-handle=1784,i,3162282329706620618,6332523134267490633,131072 /prefetch:12⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5032915723d4716b4d18a54c805233560
SHA1c8d6143b95061ff3ca08e7adf79363ca93a05e56
SHA2560449caf2b72b6b039a93caf6938dd0f6f1f451f8a511ed77f505dcde03e92c43
SHA512ac6a8be0dd7d51128d20e498ceed268c2b07f3b3b05273418f559f930f934ba6c587aa2ed567c566ea30e797e22e63822ed824ab93498bae0c253cad500b9758
-
Filesize
706B
MD50a1e4089a1db180476719269a0234746
SHA14b7b71281e21f58f14045a8b417c6c400780806f
SHA25626c2124e18e0bc562d9ac40a7800f6d01a6304c5ee9d136043c08a1d0d923181
SHA512ff0666181429822954a5c1a04731d0c05d016c08dff8f395d004a4e14dd162613b7857a543b53aaa4a7866af6bff7b0a0919fb159558c73454914491568c39f1
-
Filesize
5KB
MD5725630b9f2759ba54d1a98538b930ca1
SHA16edf65e24f9a88719d074e40dacb2a672e3cbbde
SHA25642b3952ab325e65de81d7257fa2ed03baf3c27658ba1c6fcef2ca569b2b8d19b
SHA5123f2da319040ddb19887e762176464aa236fe63439a5f567860652d015407a5dc1ad70b74af4cc9ba383f62cc464bf78ae3de7d31f85a340a568b3983d93352fa
-
Filesize
12KB
MD5eebae5ded8f651535805658a1e94685c
SHA1ca4c43dd437e1a73bd083cd8ebf7ec4b77fe0f1a
SHA256ce7d34474d23e3efdc621a5bd06300da842b40b14cd1704afeeb78a307df2858
SHA512e0da401a2eb31f1b12bde48fd0e2673a5a5aa2fc8d404c463c10b414ada41be5a82aede0731573ab4a4f9a4f8950b2ae7f1862657259278f64cf1c874815f8b8
-
Filesize
144KB
MD556aa19d45bdf9a8e3d1f60434b041ddf
SHA1f426a4fa39b4915ba8da90fce9dcbe9e806e812b
SHA2565fb03e6e1ccebda4d6b180828f5d6e621ca18018d9cd832533ba40cdd4553f14
SHA512dc99ae5ef7d6effcb71da1f8464fae1478ae49b3cc47c3dd656fa5c7ac296bf5db106da5851c4080d7fa7c107a6806d74871e3d0f67a4b22342486410ba94129
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd