Analysis
-
max time kernel
60s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 22:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://toptopictoday.com
Resource
win10v2004-20230220-en
General
-
Target
http://toptopictoday.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245168041502823" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2916 1908 chrome.exe 88 PID 1908 wrote to memory of 2916 1908 chrome.exe 88 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 2812 1908 chrome.exe 89 PID 1908 wrote to memory of 4284 1908 chrome.exe 90 PID 1908 wrote to memory of 4284 1908 chrome.exe 90 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91 PID 1908 wrote to memory of 4300 1908 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://toptopictoday.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec3929758,0x7ffec3929768,0x7ffec39297782⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:22⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4540 --field-trial-handle=1836,i,16231775678356189937,18302757637859225120,131072 /prefetch:12⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0918c23e-3cd5-441c-a806-2ee4a44d3ebf.tmp
Filesize6KB
MD54ffba8e80b76c3fdac27159326c45231
SHA1f66c69630e6679fcaa538df5cf2aeac7b4acf870
SHA25600f062e3a5af5b6b4fd044a9906a92f73d2ce2fde16fc16fd341d942b6d71f42
SHA5121dd9ed534b830c476f0452c49be0d898cabfaf884591b49a2cb6054d0e0971541924e693d47e9f417c0f3a42bc5de6b651f02060215d7da7a180b85c3509c82d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\93facf6e-ceae-4b41-8549-38e75b00ded2.tmp
Filesize6KB
MD5857a40122f5fe7fbe6a87b46da2b114a
SHA1ea336ab5423acc69954262931686189703b799ad
SHA2568864e842f3a44488538d0b775f76e5cc2b01cb51cdb9c97de77b5bf70ecab244
SHA51281a0604ba501641cb264daf916d18fa8b1f3bd244a44ce7a465f69ed9e235cf0a9035ded7140a910322ebed983db7440c28165a2cc4ef53fc8ff3ef07ca665fd
-
Filesize
5KB
MD5fa006a69b785b02294adf487aa397722
SHA187e378b0ce9c4726905f8efc0f1ab0056263b4b1
SHA256c9a376e692b4c0a42542fe6f37a0199e5af564a2ee123e01479531b2b9abf833
SHA5128d8896186e4478286ca0121f88dd39860ead57e1ab6815afe5b381c948234107750c524e9d09899ba7401b6d1ba9e961732ee9f404893b26585bf3a08e112959
-
Filesize
144KB
MD532e64de851c2b6074b896dce64ef0b2b
SHA1c90d87501c3a8ddc8b320066d016092d08416608
SHA25613a7e1b68b7e531ae15108c70af8ef330269f27b1736e42f6e7c32b13d9b5ed2
SHA512371b08eb18408e16ace496a9a1d6af7bd270da676a4faa27c38528e9a3211dcf68fc7b27c08b9e5afdd25211bc8961e0dc385cd22766bec22b9dd604ed621369
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd