Analysis
-
max time kernel
300s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg
Resource
win10v2004-20230220-en
General
-
Target
http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133265596817802093" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4072 chrome.exe 4072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1892 4792 chrome.exe 84 PID 4792 wrote to memory of 1892 4792 chrome.exe 84 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 3440 4792 chrome.exe 85 PID 4792 wrote to memory of 2464 4792 chrome.exe 86 PID 4792 wrote to memory of 2464 4792 chrome.exe 86 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87 PID 4792 wrote to memory of 2916 4792 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://x29xx2asv9v8wrvo822f6.vibeor.xyz/http/https://tc-002.adesicdn.com/1ab5d45273a9183bebb58eb74d5722d8ea6384f350caf008f08cf018f1f0566d0cb82a2a799830d1af97cd3f4b6a9a81ef3aed2fb783292b1abcf1b8560a1d1aa308008b88420298522a9f761e5aa1024fbe74e5aa853cfc933cd1219327d1232e91847a185021b184c027f97ae732b3708ee6beb80ba5db6628ced43f1196fe/2cf8bc7b8bf8ad8de9215fdc2d6257b3/ep.2.1677596608.3600.jpg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc29de9758,0x7ffc29de9768,0x7ffc29de97782⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:22⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1296 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:12⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:12⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4716 --field-trial-handle=1796,i,4365663542033497526,1231186461634684740,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5891be8e8a2f194816fe4ee8cb0bdd037
SHA1134abe450681cb1f517451c325cefda9b84c9465
SHA2568c403213c53689334236a398669a5ad8dd2d1b73c724a4a66aafb5f818c14cfd
SHA5129b76967a49e71b73bef9d3eec77c187c71dfeebe6b49218379f971be0f208b0f2b543b083be6f440ba5dab63df0e1ba4be3e6939f31e9aa3aa6b297500ad8d9b
-
Filesize
537B
MD5f176f107ed674e22989891955c47c6ae
SHA1e646999fa2bd75ed5eb08bb26c2e07c58f9e6648
SHA25605f675cca0edc22568577b658041288c84d15e48de3712593142c6e0b0544378
SHA512f7e341d84bfdb4f5cd0a5ce3e9b9dbf5eceb7c0287df7d0cdd022ea196b47e62779f312083a42aa49148da76abaeaae47c33c166286c61c15eb7f5deb51025a7
-
Filesize
5KB
MD5b97ce8690f8addaa9fdc30030a7dd64e
SHA171842b9ddc03281d85182e147029778221f8c7bc
SHA2562946d7a25ff08fbe9a8ccac2d905f51f4d8036dc808b916851b0f14edf66e66a
SHA5129f68c19ec441a56bfe3644ee7fe24d8566ebabe4c58810ed49e47ead7a533e1565be75060a2dc40dc3dfa5d292d0e01b5f8f23cb4bd17347d71b83e939bca033
-
Filesize
5KB
MD5885d0d15c1619b3fd3cc17b1cf6282c6
SHA162e6f9645acdddf781cbe3c99f7bdf4687bdbd3d
SHA256fa86d044f2c086fddc1dacedfcf4cf47dfce9dafc24e1c4d1666a911d308df86
SHA5129be2b877d7e0f7afbe38a8bc7b00026d044e0d77536e878b0f610f57135fe7b04e08a58bca3aac8252177e0845780f3ff653bff026594155436b3dfd646980f4
-
Filesize
6KB
MD586a0ca581d3aa9919e2f494ffa14c72e
SHA10150c93ebbfa20ffa55a6d2aadb1d136f1169f22
SHA2561a7ae43863ac466a58bd9b7efed650e2de01ef7178639af778de88103e34e09c
SHA51227a54bbb7e8b8bf540e2bbb111739165d6510c7289025accdfa9e78a660af999bb5ff2c359a8fcf3558abd71d244af5ab264d4c317ea81c9930931793e233b91
-
Filesize
200KB
MD57311a815fe2a7d7fda6c39febe39c7f0
SHA1c871076fae91cc664d07ddc5206c870fb71fb08a
SHA256e136f5024eeefcdc3963febe3b4d1d34c28f8e3489d1f930b9aa813af6292449
SHA51268e57e0c0820147928792fce60f2f0c77d9db6cbb7d9a1b1b4d1362053c0cb6b51392f8760328eae51ca4257c5b9938ff7feea31fee025f93f1bf1135e8d4011
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd