Analysis
-
max time kernel
159s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 12:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t2.market.mi-img.com
Resource
win10v2004-20230220-en
General
-
Target
http://t2.market.mi-img.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250073339676095" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3588 1176 chrome.exe 83 PID 1176 wrote to memory of 3588 1176 chrome.exe 83 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 4084 1176 chrome.exe 84 PID 1176 wrote to memory of 1496 1176 chrome.exe 85 PID 1176 wrote to memory of 1496 1176 chrome.exe 85 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86 PID 1176 wrote to memory of 4624 1176 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://t2.market.mi-img.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff987469758,0x7ff987469768,0x7ff9874697782⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:22⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:12⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4504 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4780 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1032 --field-trial-handle=1784,i,7194888489550770799,17901776107383463604,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5cbbcf3a03316fbae13a4663bcfa0d04a
SHA1657746e3ec443f9bdde47cec57209433110ff707
SHA25628fd6bd8cbb159128f1e1fa273fef338ce1eb9417d8f9c0280d1987a7afd772f
SHA51222ae19679bc3a3f8eae535741cf12ddd89c9c6eefcc1c027cbd2fa0c4dbf53408f4607d89f060315112a1ec9bab186d8a6cb9fc15c282e37ea189c66dd434b02
-
Filesize
6KB
MD50d2da9db43a5592a6d0af88920933aba
SHA1070598dda999ef13bfe53b300984a27460bca8db
SHA25697682fae98f98873114aaf24d900237424fb24c3d720818547e53d799ff549b0
SHA5126070cfd8feef6a074968395bb32c43b69e4a8e6faa792bf256f143b82a3d1118681433dd734aa19369bbe1e9e6cf50ceb41c18cf9827344af2a2b6a5f69cda52
-
Filesize
15KB
MD5a0ba1b2076cd090713aff21f5c5aa7ba
SHA1f79ef86b6f6f70b7100058415088c23e487428be
SHA2562c9d47046e0e0a8ff869bfd9813701d5056007e9d02a2d4d61858cda1d10d3d2
SHA512a5348d2af65cc504c07b5da515a479599750292b9fbdc8cdbe8e94decf05b675d4ecf3f22516bb1f890670a10af9254e01cb73d47d97495ed004b5ec490c8f18
-
Filesize
174KB
MD56c6bd55cefdf292a49430f7bce4bf34a
SHA1c3e7b13656c1fe30aaefb70fde526c3aaecb626d
SHA256a18dfbc71d7a74a841fd1bad520249e56924ab0e42e74a7ff5caf4ce34e085d1
SHA5122f52b35138fbf539faea47e9fb5f02e22d80763da51be2d00584e6d76d04aaad363b9b1aa1231a81d6f8497dc436c2b4b0f495cea51a15ecdbe6758ce89b031b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd