Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2023 17:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bafybeie4vohminzdbvhybqdfbobgi745cqku663wubzqd2mshsunhuvdp4.ipfs.dweb.link/mbowa21.html#
Resource
win10v2004-20230220-en
General
-
Target
https://bafybeie4vohminzdbvhybqdfbobgi745cqku663wubzqd2mshsunhuvdp4.ipfs.dweb.link/mbowa21.html#
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133262262218249990" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeCreatePagefilePrivilege 2424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3084 2424 chrome.exe 87 PID 2424 wrote to memory of 3084 2424 chrome.exe 87 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 4720 2424 chrome.exe 88 PID 2424 wrote to memory of 2696 2424 chrome.exe 89 PID 2424 wrote to memory of 2696 2424 chrome.exe 89 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90 PID 2424 wrote to memory of 1476 2424 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bafybeie4vohminzdbvhybqdfbobgi745cqku663wubzqd2mshsunhuvdp4.ipfs.dweb.link/mbowa21.html#1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe5699758,0x7fffe5699768,0x7fffe56997782⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:22⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:12⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4832 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2360 --field-trial-handle=1804,i,11117688463605342435,10189660735025061642,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD518eb44ef1167f530555de724ba020c5a
SHA197a17594fc5d7e6b042df31b39a96b240de9eda8
SHA25637d235d8600138571c4f4c440dfa580edbe76cfc2f3f5d9093f0053ba2d0de97
SHA5120d6aaa744bdc735abe5670b3d9a3e31212e3b2722b54f4130d97926b515145a09e735feb47a61a5620d8b10452adb4db7538a9c3b951660c0b1e599923b498a7
-
Filesize
2KB
MD51b0a3d8b10d6a9900e9014035a4ef0c2
SHA11d0e40dfaf0152833b2b67532bdab8699cdfdb65
SHA256602bbdc45a39ddffcf27c7d731591779797f0828a3ff1e711d349c509fb410ea
SHA5124b69a43c67668c263e5772ba26ba67184b512803d4fc266ea05d00b30285b01e65fe48951c45a3840f118f65efc5fa7b2428dde367cf7037b7f27c568b748448
-
Filesize
2KB
MD5ea4d0629a4721878c50cfd3d4551bdf8
SHA1b620338cd153db18dce46197e4f07a48260348c1
SHA256ea52ca66646c9624fb3e40c5ce8b6ffb35c57d93f70f5ac785d9fd5460116879
SHA512e2909b7e3b90337cb0ff3480f2f94103cf64504fa9614f381d3a07fe026de8c60290c5f693b16d1d7987d9cbd9216a072100207f11d37a9d1341983d8479fba0
-
Filesize
1KB
MD5d69da8efaf9f3a6859b9fbe28a9e46b6
SHA1294eb98124d2a7628dbc4faa490de770621f2dd1
SHA256d26f3c6c24b0357e2c78ccd73e965ff6498600f69e4906098f4d75469f2efb34
SHA512acc8a26f9e3d21f44b5c9e7b669625fbf3e78e4c866b74469baf5a1603fe65c9c512995af9619a16355a4b9d390ceb02e47522c1b08db237d0e8e524d81462ba
-
Filesize
9KB
MD56332d8dc3895c20a9ae453cd3a303844
SHA105a502d2a1cf2bee3f8d6590701b9b512ac3e486
SHA2560e4667098ac54573472e0170c8701f8972106adcfa69b8093e38b44b15eb7be9
SHA512f2696ba93383be493fe5e734bece2627b899f4b80eec0be8bfa7d99222b3269778c599c85af83693d2fb2b38dbc79443a2daa4b79c58503400a23bab921facd7
-
Filesize
8KB
MD5a882562ac714d5e312253499b90bc5cc
SHA1846aca1cddfc48496f14ef646bb348b1ea8a7b8f
SHA2564e9ea615ba69d6e6a6156d799f2a084f6c4b6e5c9c0ac3939761cf3da9823547
SHA5120dfdc4733b5df773116555aff352fefbc29db6276d6c065efda574aba0cc9f7d2c867cb0c4df7b35526a92b70f57618245e316d0272589d43d85eb08dd1b56f5
-
Filesize
8KB
MD50232b3c44631468314ed3fcab0342b10
SHA128b647c5879e1d8bfb229f18ed719f74eb7e5761
SHA25669e53e94dce934b064cc808f4483d905d882be0bbbc48b5ac5543409bba7ea65
SHA51239150978353f77a7b315848b50ca5021bdde7eb2713379da18e8960963cc622d799d1aed71c2afd94f6a46b2e6b352095b5962a1c3fbb3e82b1bb1a80eb6f57c
-
Filesize
9KB
MD5cf32269836b2a77f26d92dfcf0513120
SHA1761d9dea4a0d97a866cdd2955d25a306f9b3c609
SHA25689baf59cc649189ce7aeb98633963537119e1433fd292a4c9f1c64d3c2c75362
SHA5127cfed29f6e91451f0f6451796c9a63ddb2049824f9830d1bc8e8204fe6efd72c295ce2f183a11e5c40f8a9618519f2daf70fe676269da6d2290598589bac0451
-
Filesize
199KB
MD53e5a987a021842cc52e9a67e507a0ff1
SHA183e05b325e9d60d5b67583ec426d255c0bc6a589
SHA2567a1bf6b87c4a2df6fc79a30e63ede0b9389b4238cb991a8ed46aa29d779b751e
SHA51262d9106b0aea9ec1181b733e658091a3dfc4240f1e88bd8ee8a058f59af64aed10008b084551d9b326e4769ee41b8a4592895389e83e9d1cbbcf7abe92f0a250
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd