Analysis
-
max time kernel
300s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hostedservermx.com/?kwmj&[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://hostedservermx.com/?kwmj&[email protected]
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2160 2376 WerFault.exe 92 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133244274179711673" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1796 chrome.exe 1796 chrome.exe 2408 chrome.exe 2408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1796 chrome.exe 1796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeCreatePagefilePrivilege 1796 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2472 1796 chrome.exe 83 PID 1796 wrote to memory of 2472 1796 chrome.exe 83 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 4472 1796 chrome.exe 84 PID 1796 wrote to memory of 2492 1796 chrome.exe 85 PID 1796 wrote to memory of 2492 1796 chrome.exe 85 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86 PID 1796 wrote to memory of 1828 1796 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://hostedservermx.com/?kwmj&[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffdec4f9758,0x7ffdec4f9768,0x7ffdec4f97782⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:22⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:82⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5320 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:82⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3992 --field-trial-handle=1776,i,3946808545769598640,770900008356104557,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4556
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 2376 -ip 23761⤵PID:1020
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2376 -s 17641⤵
- Program crash
PID:2160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
947B
MD53c413b10ed533f9297d14044d688b0d5
SHA18d58454bce66a9146d6221bb4bf10fead7b0cdff
SHA256742a68a862d2bc885cb3c7c8de599838523edb2464d85d7afaad7211778e78d0
SHA51296c3b03b5d7d0a8b5c716a225a6e87844607205f4cd02e7cf768627b225173a19df376fbe72f08b68855e9bbe7fd4076b7bc9cda5dd1ed32f69bb09de9e4afc8
-
Filesize
539B
MD5697e454ffa06744c1d94f6bc291e33c9
SHA1b28108a90cf20804a0e73779f2804b9a0fad94c9
SHA256780e0b69c13121eedd71e9f3e136e1ef5a7ca9347f9d0710a085f90e140b731b
SHA512bb855d3ae7818e995396a84c83bd1a34e1c1ee00b63a6a6dc07cfe001bd2a336523270d65b2cacab5697cc4470ab7f125b9177fc589b758799cd031510fddbc9
-
Filesize
6KB
MD5308e2428fdc92595630e15c9b7a37695
SHA1bae41481609ea7015cf353d77de204639643a8be
SHA256605aa22c613d348118e28aec759c60652c4c12834348607a57758f2f7bb26112
SHA512ff2674791fce4cb7535e7947e9a1df67a2f1498e87b83bdbf2333a757d5731d86c6a487868a9323131f199e27fa15ccc5228a2ee3eaf67c1ae61164a1d3c437a
-
Filesize
15KB
MD5990b354f0debca371c6077474b4ddce2
SHA1081470d57e4a647e06f46e6d61c1fcb4ddf3472b
SHA256e66f32f02a2ac5c5fb0eb726e17be61204b7aa8741419865a54b5e1b11fc561d
SHA512b4c038652a5b9b8ae606f373ff3b6eb7ef99a7d0dac55d32b4d057c92d3b935880cbf87eb5433b28b324c49f9bb1e78be745ce0c5531d3ab72c3c04905bd088d
-
Filesize
145KB
MD524b94d7413bec2bf4658a4788a21bf9c
SHA1733dfedf0e9df512916db574629942b324318450
SHA256c4d59727fe5b861a958f9a5fa6ab46fb080769597cf4d2d4c768f40da5dd325c
SHA51293bca51f4cdbc1d1c142d2569afc028596a2d4ed122ca22398991bc704b16d330eaea27cdf969edc0d18dd8a89f5ac51d2eb9928f24bf4e94e635d34c2b273bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd