Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 22:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.bitberryupdates.com/v2.html?app=FMP&v=20140804&l=EN&id=0&it=1487289540
Resource
win10v2004-20230220-en
General
-
Target
http://www.bitberryupdates.com/v2.html?app=FMP&v=20140804&l=EN&id=0&it=1487289540
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133259066054975043" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1524 1916 chrome.exe 84 PID 1916 wrote to memory of 1524 1916 chrome.exe 84 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 1764 1916 chrome.exe 85 PID 1916 wrote to memory of 4396 1916 chrome.exe 86 PID 1916 wrote to memory of 4396 1916 chrome.exe 86 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87 PID 1916 wrote to memory of 1140 1916 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.bitberryupdates.com/v2.html?app=FMP&v=20140804&l=EN&id=0&it=14872895401⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa662a9758,0x7ffa662a9768,0x7ffa662a97782⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:22⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:12⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:12⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4688 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1820,i,8258650085659151237,2828309320754719795,131072 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d723ccf419930470e2c9429347841bf7
SHA1c6aaf9e64b0eece8f53dd6a5bb5ed08bf5ca0ff1
SHA256e88b88480123cbb97fff7d504f5b0967a500ed9000c4808bc468826ba00a7e5e
SHA512014990a5edc72c9c8c75c74db52fd1c5b8830f883379c251cff1aea617ba5d7c470beeefaedd2625a821c79745138c48de5a47247e88f5b3ccb857173c9c6d6f
-
Filesize
15KB
MD5561353d227afefa2eb541ed85da06057
SHA1894d15f78fd2e82b91eb6a726a1636ba10335751
SHA256e6eb7b91b08a6ecc526469f279d6772d6d95a86666ade7fb01e204572db7b0c9
SHA512e090db0919dc8be72a348c805c0cb0c0fe05255ea3f2fb2633e3e9044097aaa5578b3a36ae71f195ad51da786bd57a6619f7f17d27081d312fde98699b1d84c5
-
Filesize
199KB
MD5fdf28cb1c29435e9470d016f82a86f1e
SHA114f3ec1e0c7601166ba10143a40f804c03b98c7f
SHA256e830655be20ed3bbd8955b0c880718de67efd876afd834222ea495ef6bbcb9d9
SHA5127d5b463f30c4c6ab7840eb6a4ca773dc1b7e2f34f18bc7354a5089e593f24652edfff75e5a245311bc89521de19119d969e8665a8967e02a70cfb2c6ab8be7cf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd