Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 22:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://atlantis.nyc3.digitaloceanspaces.com
Resource
win10v2004-20230220-en
General
-
Target
http://atlantis.nyc3.digitaloceanspaces.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294475260723817" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4736 2980 chrome.exe 85 PID 2980 wrote to memory of 4736 2980 chrome.exe 85 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3484 2980 chrome.exe 86 PID 2980 wrote to memory of 3000 2980 chrome.exe 87 PID 2980 wrote to memory of 3000 2980 chrome.exe 87 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88 PID 2980 wrote to memory of 1108 2980 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://atlantis.nyc3.digitaloceanspaces.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc837f9758,0x7ffc837f9768,0x7ffc837f97782⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:22⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4892 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:82⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 --field-trial-handle=1704,i,14632912277485543882,5610963396299977430,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
976B
MD5a83d5a17efae12d5c01ab17bd9720641
SHA16599a037ba7128c70612fe05f0d3f3929339862f
SHA2560b2b461a9cc1b280b377643d8a59e9081342025d2e8d60aa8b0b3ab568eabfd4
SHA5127df0f1971f7005145933f7d4df024f0d2cfd63b2773d2722cf561f26618f1f8daefa0b7a3cb05c0390adf8a6c51eaaf96cb64e3b953ef42f59dc09e98c38c529
-
Filesize
538B
MD51380f2f1f360ea879bdb0288ce270f19
SHA15b3defa08b18fcddc6a5aaf258ec4b08d02cdc97
SHA256410c935326af41cbc85e8469d84426be218e3b8bd2967b5f599d097bb51eb1d7
SHA5125cf5bc5276c78c363446355696d6056a4fc4a6308efdcb5aceccf3e4587f105021d2614f9e9d32b6f3b46ed937a2eadaccd4f5b3dc3a656e2cbe670e4db46997
-
Filesize
6KB
MD5df8db53447aecb9ca9c8e4023b83f423
SHA1fc2ecfb9314e6c0c2f1a955516f388c3837e3f14
SHA2564d40235e6ced1780773a336f56e8943213708951620180dab5e33984e9ef7587
SHA5120d8e901a3ef96b94dbc7dfaab05f41670e4153fc01326d52d14abb76bca2f71e0a484e7cd416e764aa09dc59bdb7775552fdc8b2d7ec054e1f4a30237afef304
-
Filesize
15KB
MD502628b620092cad8a455ff8a9f3c6d00
SHA177d18e9dc2568ea9522e1b1d696ce0855154dac4
SHA256a0d0fa5f1d99d49c3b553630945bce8a76282e4d3b2ca09c3e8913a2858db4c8
SHA512cbafdb8afa30cd05c8fd4a2a78f4481615005660332ff753035c2f9a5d6d4b6b27acf68cd4c1663b9ef80062f3a411b5cc0c112041b014063b6bff2e409aac75
-
Filesize
152KB
MD57f0c83c7b5d792d82a461095a2b58eaf
SHA1bd8720aea434f4a3342c5789c31a37b220193af3
SHA256f2ed08a6afbb3871f90d465d046187cfeedbf1d1454e69e56f312c5dfa7d729c
SHA512c2e16f6ef070ebe702329a26fc3fb2f21656b775fb26d0b1a7d67a822ce281b26a10f82618524127b992d8521e9bfd7915398eb8112e9fa12ceff74ff55f0574
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd