Analysis
-
max time kernel
157s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18-05-2023 03:37
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fleek.ipfs.io/ipfs/bafybeih3ffzy4v2cstq2kgms3u2hzxvjjiarwyqxoavutyptbhcjzc6kv4/#[email protected]
Resource
win10-20230220-en
General
-
Target
https://fleek.ipfs.io/ipfs/bafybeih3ffzy4v2cstq2kgms3u2hzxvjjiarwyqxoavutyptbhcjzc6kv4/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133288618942521537" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 580 chrome.exe 580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3988 3660 chrome.exe 66 PID 3660 wrote to memory of 3988 3660 chrome.exe 66 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 2900 3660 chrome.exe 69 PID 3660 wrote to memory of 3908 3660 chrome.exe 68 PID 3660 wrote to memory of 3908 3660 chrome.exe 68 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70 PID 3660 wrote to memory of 1096 3660 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://fleek.ipfs.io/ipfs/bafybeih3ffzy4v2cstq2kgms3u2hzxvjjiarwyqxoavutyptbhcjzc6kv4/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd52f59758,0x7ffd52f59768,0x7ffd52f597782⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:22⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1768 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4552 --field-trial-handle=1720,i,7634831963957576036,6817753761379427586,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708B
MD5c7caeb97f17b31dc6a3d69e062ce9c13
SHA1e84d95f368e8783aabd8d4701248018f53fcd46c
SHA256d8188683e2a2256460445ed3b08f12c7e3e389963209b82f92c7ad4e8ba3dd04
SHA5123a4e26471fe3c74d4ba9fcf5aa499162026d3feed651f52e66e080d7eee4d591d99df3d4f3ee67984bd1e0d8c36d5a28598b89e6ca44e5dd813e16067a532610
-
Filesize
701B
MD54d06ff7a2173f3374f3fe126c5f9fb4e
SHA1ac8d76c9c1b3864dd5b9bb426f26c6daaf86a815
SHA256bfd0eb097f847d13a9e922d76e90cc2666bf5bccd81a969202def416e2d7d3e8
SHA51244f4cba22c80ddd9eb149a195cbe5c343c9886ac225051aedccbdfdf09c082b34c2c385a225f3607291daceb955f8fd035ec21474a0e8aa91d7189bd63dd9a1d
-
Filesize
6KB
MD5d2907c65ba039ad12379958824f0cf71
SHA1972ddae32c27fad6f25069486191ca2ccbb3d3f9
SHA25639a9b5557b260cc51e36c00be5a70939cddceee3ac14ff208431c20eff83d85a
SHA512a85aad57eba509ae9bad35796402daa8a48d2136f84c570dca12df1b908eea6ab856842399a1040354272766afddbff322bf422ca9a7fc96aa985b679821628c
-
Filesize
5KB
MD5775fac81c8f3278853346e01b645ffc5
SHA171779ed5414a8d5c1e1c3cea264e7d0fc77a9eaf
SHA256aebfa406301647e54df02405f4f3211b4c88645e0efaca0c62b5fbe83f595ee9
SHA512d4ea72e719cab4dd84e16d628a54ababfa4081792f97a5cf4109694aa1a60902f5601a68b8b571bd85a2ba29766d9f178d72d02719066f3801b6a4e4aa41ea79
-
Filesize
5KB
MD533e763f211909795818b0c8fa51c61ba
SHA1d884baa7dc03c6ff1c4360b5d779fa50ed115dc6
SHA256ba345793a94605bb1c75514049e89bfcaee6007b4bb88bfbb54aaee3d4de2af3
SHA512af0d3bc0d7ae74d1685f34fef774be3381062f8c46ff6ceca8a9c2ea8310f6e8fc01a3c66b02d46a3ac7880e51ca97f57118065a334ba93d126489c47e32e3bc
-
Filesize
153KB
MD57fdeb937483232f75383bf5262bd401a
SHA1f76315c3d42c1cbabdbfb5f087a478a11d7ca459
SHA256157533de76bd72f0d9e46deff0529038c9f5d2820cff97683f608b5b175bdcf9
SHA5125ef8c486a1696e73e9e1f2711c0c34f82c64b350bb1d5fc467028b8a0953ad55ff95822d8307ee1cf1866998b1a215533d8ac8e9dfa7a5bbc2f0446a9d2698bc
-
Filesize
152KB
MD531b64f4a07755ef815a0bd5becc76688
SHA175dd2d31485091adc41c43b6baf25c7eafad2191
SHA2565fddc245d4a9a1a37de263f23ea3403b3b6a8c5ff6311f27f672d5088ebac659
SHA512cdc790b8fcbd7c849bb07b72502e20de252f09b586fa74f70351d6b8eb49ad64a944d05d241d399394f7c9bb22a7c969df757514b2ff5ed2d3cbf6af928e3863
-
Filesize
153KB
MD529db5522f0542b300c81e45cfe7cfd66
SHA1e41d89ea2d2435134c17099904e09a946516b03b
SHA25658012ed1d606708e66a06e4d8f806c49c3e2807d63e57f1dd9dc4cac44157cf9
SHA512a6489540ef4271adfa3cdfe2aca1ebfccf4a1ecd3d028fcbdc90cdc27a6539f60651ba828f71c613571d18216cae4c59b74f8199102816520cca312881bd4fd9
-
Filesize
72KB
MD5def3cd2c8d0dc30e16b7899c49c0628c
SHA1743679b69b680ffd1108141fdbdd9864165ca5c2
SHA256e168dbe5aa7bc248cd2f8ea6c47c31c35df93767e7a5a3843408c45f0c3e25ae
SHA51200f79fed4e28b7468ef611b4ce47beb41d1cda202715556d81d4249be03db15ef63a1335a173748779a6b79da38d33bed44dced1cda756d55b967edcdcc3dd15
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd