Analysis
-
max time kernel
25s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://papapussy.standartcoder.me/
Resource
win10v2004-20230220-en
General
-
Target
https://papapussy.standartcoder.me/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250149526144206" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4704 3620 chrome.exe 84 PID 3620 wrote to memory of 4704 3620 chrome.exe 84 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 988 3620 chrome.exe 85 PID 3620 wrote to memory of 1228 3620 chrome.exe 86 PID 3620 wrote to memory of 1228 3620 chrome.exe 86 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88 PID 3620 wrote to memory of 2384 3620 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://papapussy.standartcoder.me/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffab769758,0x7fffab769768,0x7fffab7697782⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:22⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4996 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1824,i,15544450849696510530,5950016635259203122,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5a9813ec81e17e3b795b1f0cbcdad707b
SHA109689455394d7edeb55b0e5db095c76a7a49bacb
SHA256808b9532096f8da36d484a0d5772a9cedb05a9ba8dc435888266836f5cc83f6e
SHA512f8814d0245f3a259d426a38150d4bf186ad9c12368ab8353f44f1eb8f4212bb7845898a83514b655f4dd0a9eeb769597c7a698ff757ee9dbf82fb1fcd686c637
-
Filesize
6KB
MD5d5f95807b83e63e623774bb6ff90863c
SHA1d7dc889fad850225a40d56e017062aaa40acb774
SHA25667d8cabfabf0e1a975495ddd90b87b7d1bc1830cf2a57e2ca56a6ef6dc9e11aa
SHA512348f1132f9ddda2682fbff6112259a3d3e51865a0808211c81477630a62585375c8522e47b7a059fad3091a5b7e3f4c0cf7afc6ca2c0870dba79f8e0f4f90c51
-
Filesize
15KB
MD5d9726fe2823e4db2430acca181174dba
SHA14724c07eb3df021b9361ede76a9e55912e711af0
SHA256c27002f9e9a9d0faf03b08dc08e0208bdf0a4eb7cfd57717704fe01a90d03fe7
SHA51294547f7ee7362f0f9a82ac719a434ced4f312079579cad10ab4863d3d8dccc815a8a88053045552352a2b9f5b35704f0cb03f1fc5633b349f999dc9f0d9e469c
-
Filesize
174KB
MD5054f97fdeabfc5db45aac4c46abb038a
SHA177aec8b2dc66bb16e37c12618e7b05985b78d813
SHA25677c096f41a50a9a7d7ad1984002ace738d07d32c88311305a8cf045b019756c5
SHA512960cee98801deb2c05d0cbd805338590a770978279f9288c185709d5f1af60a6af03a8eff8dd7ad23d05533c0c101f503c59ace3014e48adbca3bd6d10a74a5c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd