Analysis
-
max time kernel
77s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 08:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://8chir.r.a.d.sendibm1.com/mk/cl/f/NBJw3oam_0aKWiWDOkqGb5QpstXdzZrwH3tFoXhXT80UDmvv4ejIMIiLLhaa4BQNu0tY2cXWLt2Zonn7dTY9e5SafwKLssxos2VeDXIoSWF8-FBaP-FQgg1Zg7ttvLsoFeO5NwZqARzwEACZOAvRUpz4JPOlSby6C__NPbYf_A_DE5sSimb9Q_eM3qwYRwZtSClQnMrtgAgH-T9GiEPF6EbOVAJFGD9uNg2SvcSyGe1Bmhh9jMIqgUwdwOTZva59S13E8hRuswUuOeULsOehmaCqQvw
Resource
win10v2004-20230220-en
General
-
Target
https://8chir.r.a.d.sendibm1.com/mk/cl/f/NBJw3oam_0aKWiWDOkqGb5QpstXdzZrwH3tFoXhXT80UDmvv4ejIMIiLLhaa4BQNu0tY2cXWLt2Zonn7dTY9e5SafwKLssxos2VeDXIoSWF8-FBaP-FQgg1Zg7ttvLsoFeO5NwZqARzwEACZOAvRUpz4JPOlSby6C__NPbYf_A_DE5sSimb9Q_eM3qwYRwZtSClQnMrtgAgH-T9GiEPF6EbOVAJFGD9uNg2SvcSyGe1Bmhh9jMIqgUwdwOTZva59S13E8hRuswUuOeULsOehmaCqQvw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133286209505581467" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4656 4288 chrome.exe 85 PID 4288 wrote to memory of 4656 4288 chrome.exe 85 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 4200 4288 chrome.exe 86 PID 4288 wrote to memory of 3260 4288 chrome.exe 87 PID 4288 wrote to memory of 3260 4288 chrome.exe 87 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88 PID 4288 wrote to memory of 4416 4288 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://8chir.r.a.d.sendibm1.com/mk/cl/f/NBJw3oam_0aKWiWDOkqGb5QpstXdzZrwH3tFoXhXT80UDmvv4ejIMIiLLhaa4BQNu0tY2cXWLt2Zonn7dTY9e5SafwKLssxos2VeDXIoSWF8-FBaP-FQgg1Zg7ttvLsoFeO5NwZqARzwEACZOAvRUpz4JPOlSby6C__NPbYf_A_DE5sSimb9Q_eM3qwYRwZtSClQnMrtgAgH-T9GiEPF6EbOVAJFGD9uNg2SvcSyGe1Bmhh9jMIqgUwdwOTZva59S13E8hRuswUuOeULsOehmaCqQvw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb17e9758,0x7ffeb17e9768,0x7ffeb17e97782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:22⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4864 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1604 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2628 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5236 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3316 --field-trial-handle=1808,i,13874342883728499915,14193780933813594463,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD548bd5eb5bbf565c3a148a6cdc095ce5a
SHA11323be5112c4b394fb3251b8ad0ce58b564f186a
SHA25686f704a3352d973c2a49843c1049e2e6906e9c9e5a4c306f7452b0d6681c683b
SHA512346f745ad22248fd4e9356c971e7db490f4b3252bbd5fddf92086ac2d2ff3eea4be13974cab52110a33fcaaa16f407f846c22b3409c10cdce0f20e62ec31a332
-
Filesize
2KB
MD52332a3ec3e0280c72994a17ef0ea3c3c
SHA1547f60660d422b5606f035dfa894b87093dd10ef
SHA256c6d8725b7a09ccc04ac4cc73ab4585f22e27176634539c28daed49961430ae64
SHA512244a8f6d1c117c23738c1e3536dec907b5d5fd6cc2131d3fb4b77db65ccdad21561a3cc80d23c18aad13b5b30af59546a681aa4793ca43fb70594956c03c0a89
-
Filesize
4KB
MD54cbe94c0c7de0ef58888a9c83f9c0abd
SHA10b44b144a883f9ec184f2d932c5f1dc1412dde1b
SHA256f7d0c90af7ca76b5343a878aba093bb816429ef615f1b8cf718f3d6dc4b82c34
SHA5125dacb855045c599ae6000b8c911937d94cf6d2a00d0a23d5d7ffe72d4a54469c5ae5812f9447be5ce6ecf05fade24bfc40663c68623ec559764e0e2c01502ed6
-
Filesize
4KB
MD5e79bb6ed6dcb868fd36ad4dc46fb398b
SHA19e00911300bce07fed5a6d6ef7966edf8dc2f449
SHA2567c51f48f6620ceeb997b46ea7fa3b68c879ae3aee575a370524aa335ff26468a
SHA51223654503c9450cc7b1df2b9b28bcdcac6429962d2759cf0fd6137611e829243a84c68bc51247fea378d79b18e550c64bffd75fe5c2f5ba8c96d828ba9860a8a0
-
Filesize
151KB
MD5546043ae0ff8748a9db3ccfb4fc7bda4
SHA1deea107511b431b8d3e11339e25f9fc6b8d41aea
SHA256c4cde6e1c6eb920ed32d4ffc35e4f81cd04d4ce99b3fb446649daf2d1500f153
SHA51291e925199737c43a759aa3e87245f6f2ab97f2434cb8689bd719adece498ef5742b4aebcb21f4f50f13464082b6b36062b0b1ec2d79f6ddfecff9fd64925850e