Analysis
-
max time kernel
82s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 03:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1073912598946402336/1084365135273017434/ValyseOfficialRelease1.4.1-b.2.zip
Resource
win10v2004-20230220-en
General
-
Target
https://cdn.discordapp.com/attachments/1073912598946402336/1084365135273017434/ValyseOfficialRelease1.4.1-b.2.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133247939686934605" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4328 Valyse Launcher.exe 4328 Valyse Launcher.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeDebugPrivilege 2276 Valyse Launcher.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4136 4760 chrome.exe 81 PID 4760 wrote to memory of 4136 4760 chrome.exe 81 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 2100 4760 chrome.exe 84 PID 4760 wrote to memory of 4784 4760 chrome.exe 85 PID 4760 wrote to memory of 4784 4760 chrome.exe 85 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86 PID 4760 wrote to memory of 3484 4760 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://cdn.discordapp.com/attachments/1073912598946402336/1084365135273017434/ValyseOfficialRelease1.4.1-b.2.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0cd29758,0x7ffa0cd29768,0x7ffa0cd297782⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3212 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:82⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1808,i,17351945490385907506,1831588258341575073,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2568
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_ValyseOfficialRelease1.4.1-b.2.zip\Valyse Launcher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
C:\Users\Admin\Downloads\ValyseOfficialRelease1.4.1-b.2\Valyse Launcher.exe"C:\Users\Admin\Downloads\ValyseOfficialRelease1.4.1-b.2\Valyse Launcher.exe"1⤵PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD55b79a96316593be184e1f96a8fa4bbc8
SHA1af6dff01ed96d7634bc7607f2872bf28e52ee6fd
SHA256c84ec1189698bbbd284aee5994cf36d84b632ab2c9bcb84a0f55a78ed82a1931
SHA512aa151fd8e234c92b0893dd46dd95d1798bd1f792385fdb43fbca548f4df83f01e9d1b1a682ebfe331b0adb9e229f3660034b8fb7e79ac23917f1ec83433017cc
-
Filesize
5KB
MD5291b756e487fc47269efb67f1572da60
SHA108248b2ff0c3df1e3768697598c2a40760f494cd
SHA256f478d6eb880f3d04d42a6dab447b21c734a78ceae0864e6d33a3bee322a8547a
SHA5126315801f0f682c42c5ca7fe6a12a35c99bda135db08c4f54196bd8747532f22274b6bd0c6e052e90b687e795954b931891fa4272446ca6a9c89bb9034599cd33
-
Filesize
5KB
MD53f66b6f491e6c04efabf411457179c88
SHA17410d98ea3a8867535c25530fd0981185a4dc8df
SHA2562ad0d3ccf22944778e3abcf156a9adfd3f3acc8783a27baf5d8dffcd119c0142
SHA512751655cb6ddc42b9881254277c69cd50691a7d7be397ac9a8513458011bd03e569b8390d1a8d62573539943fe29f04a30fb8a6e235b54f2af2796c34afaca44e
-
Filesize
5KB
MD5792fb371a86f5051de9fc533c196e160
SHA1698cb9aaaadd75b2fb70dd2d9ea396f865e7158a
SHA256c5f79734ec37a35ad6aaf57b2fec2084375c26a311c26a2272052e4859e43a20
SHA5120214bcc5ba586f27b36d3a08821e12dc63f0f0897f1fcaca36defb232f291d8f95c0f6d8c6ca00bb8b22606defaf106439655c7848049d8d96fea9eff14f4140
-
Filesize
173KB
MD541a0925cdb6633fa0715d72b83a087a7
SHA13004bcdb626527b63f58f3b09df10df1dd467f6d
SHA256cd34477d5420aeea9f48b46cbfe42ec672d5430c5142fbc967bc1885ba884314
SHA512d2668aec916c69eca190d88d16e4c04e53f810112a5f9d375e83cad8292b0247847a7716efac9c6e5c290feee548cdd39574dc8fb6b7a7d4e5dae26e5cdc1b7e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2KB
MD5ccd4478192de0b1d490911683da2192a
SHA1403b7559f92d37a1e3ded2053b15ddaab5ae767c
SHA256e8f1353b2a56959ef9e92954a2510cc781591f7c0310beeeb57e61149b4aa571
SHA512f4b23fa31a79519cf72fe1c7970c508f2a4b727c292bdcfc906121b01be9d2dceb35ced9d7a14bad36eee57f51074b56f0b695ea770eff995583302fd9429cd1
-
Filesize
9.7MB
MD55a0901dfdb36813e50f9a779a6841d1f
SHA1385087aa72b713cc19190c7d364062020dc976d8
SHA256c1eab41cfdb38cb9e3c7dab2bcaa8f80aeeb7a1d17485853c6d9624ef6a44185
SHA512be4d7cccca684f7e45be473f23d7f42bf9bb1c110250207aabbc50abbb204ce7758e3cc732215f6c9f9ef20d60ed05605f8e6afe923390aa31b288dcd55e1642