Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/04/2023, 14:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://callback-22ygx.ondigitalocean.app
Resource
win10-20230220-en
General
-
Target
http://callback-22ygx.ondigitalocean.app
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133265674592152494" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4452 4280 chrome.exe 66 PID 4280 wrote to memory of 4452 4280 chrome.exe 66 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4624 4280 chrome.exe 69 PID 4280 wrote to memory of 4656 4280 chrome.exe 68 PID 4280 wrote to memory of 4656 4280 chrome.exe 68 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70 PID 4280 wrote to memory of 1432 4280 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://callback-22ygx.ondigitalocean.app1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xcc,0xdc,0x7ffec8c39758,0x7ffec8c39768,0x7ffec8c397782⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1720 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:22⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:82⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2740 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2752 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:12⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3572 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:12⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4380 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3176 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3192 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3156 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:82⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3700 --field-trial-handle=1832,i,12550316306005137085,7022920328299442911,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661B
MD5213c35453b2b4964651494102aa1f4d5
SHA19e960d3bfc641a0fce410cece88ddd968846d03d
SHA256f20a28705e73125355754d37c55bca2bf3c7e31f432b54e0bad6b64d123f9214
SHA512494fce878cfb08aa36c7ea664ded279c2254328330be82c5817b421f68fbe5084741bde546eca22e75abf7cce58008573064ada4d9bca6fb6fe0920b8f5bc625
-
Filesize
538B
MD55bfb9f001761ccd4e31b68fe263522dd
SHA17e662529687f5eb013b1c9e0a9b5a2000f6feeb3
SHA256acc4f35521fbfeb8afecffa666ed3d310830dba52283eff1a80644cecd780104
SHA51282744da5cc9cb3f52fce4d9571facbfd11bbca58d2582e1bcef55b5f7aa254a72fd63d718e885b6b5123f3a9edb905755ef749efa20ce4e7533c47b64c52925c
-
Filesize
5KB
MD57ef6402f25bdf4574bb9abb0cb4fa55f
SHA1117ebf136bb07ff641b40d6868d9869c5dc37a17
SHA2561d78d52b7d4d9b39d5ab6a77e15375de97d9342ba4dc7df649144b14d2fb2f4a
SHA512d3ef7017370140c782896364f304b11ad5d0a834580bdf4c4b5fe0801fbea7db6fa54441e91686b341d2c5fb9f989491eff22cec23ed5a90ad9565bc926d053d
-
Filesize
5KB
MD5d456001bfb51fa40c4d8906a66d6b9c2
SHA10fea9606e75080a83dd3e49404c72133a4ec3315
SHA256c536e39acf21ab2168769ae8b1ffe5ace814cd1449c1623a5e9790923df6215d
SHA5122d0e8d3f62c83e0b0911c4e8738467e27071e640b1f63c8a89bf70456d74ecb3bbbc5e3c53d7734cafa1a61d4246475b871f7f38d05b71bcd19441cf2d84ec25
-
Filesize
5KB
MD5b3602f2f130b64d77323e41ddbfa127c
SHA171c903100f9e0633aa809cc6e8e736ae7442ae12
SHA25679a01423503d62f79e591f561b2d6f67e6be9c0641fdf960df13030b1172ce77
SHA512b1b18afe4ead8133d6afa8efeeb4df667ae020b59ceca5b1d1ddeb9507507a65184cb99b23aa67cd60568f15b8363f5f78111d7a50bd2a8370fdc27fe8fef743
-
Filesize
72KB
MD5dc210d55545fc32ac715b5bfb0d91117
SHA180d0da2ed806c7175f441d618afdca9a16f00b8e
SHA2567f750fbe8cf4f557e5e064080e7457973103e7c0a2e45c17316e7e1bd68773bf
SHA51206ed4712887b37cb751bad7abcc99f6059d79388592759b41b641b5cf4c181b17435267a5604dca6e5c0c15240524756513b151d0613c149da27795af992cdee
-
Filesize
202KB
MD5e4b062d471aacfa909abab3cf6ac2a3f
SHA147239087b2405f9ff31839ae842fad4fe9473ae2
SHA256b0b612f6b9200ed2840f8a8f58de6f45c0386349a063563ab8719a9b3c4034d1
SHA512d2f62578ff5ecc0e1e917e4397694e5380ad09fa1a952c888fd153f9326dc7f71d9f65a8f3ab864c9144253c6c76813be2ac7a8ddb25cecde6ae047274f6c321
-
Filesize
202KB
MD504de8fd6a2b88d94387601b5fad0f329
SHA1d8308f10e4f42476f25c9cda06325eeb6fe83148
SHA25690e465d2b15f4b233d03fa25eaa2c5e74688b271a852ecb70d18f7eb6384e98e
SHA512716e47a3dcb76dddf9ed942a71a90588c1e77a3a7e8c474a63a117c0825c058df71dc9d7f966c2aeaba6fc3f0e427154b31e4b9b4f78d4d7294a5425b1033cad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd