Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 18:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://v.rxdst.com
Resource
win10v2004-20230220-en
General
-
Target
http://v.rxdst.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294328001501701" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe 2140 chrome.exe 2140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeCreatePagefilePrivilege 2688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3652 2688 chrome.exe 84 PID 2688 wrote to memory of 3652 2688 chrome.exe 84 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 4628 2688 chrome.exe 85 PID 2688 wrote to memory of 2260 2688 chrome.exe 86 PID 2688 wrote to memory of 2260 2688 chrome.exe 86 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87 PID 2688 wrote to memory of 652 2688 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://v.rxdst.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffeae809758,0x7ffeae809768,0x7ffeae8097782⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:22⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4472 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 --field-trial-handle=1824,i,3892225325666711984,14678644694301132165,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5aab6a7375546a70241cd480bea540307
SHA1b5a38d07dd6bf59bebd12b76f41ea4b1063488b2
SHA256500ec3faca7deaf2b89a70b8801b718eba56758d1856970257e85116968d170e
SHA5120f5efc78b00d54cce45c23bddb3a4435eddad01f29e5fcb29297dcc64d8c1407a2cc6874554fb72258ac15ebb18a42bb243be3849aa465a8d6155ce58b8d0de2
-
Filesize
1KB
MD5b41293672d7e1889fda740f3172dde3e
SHA1f7e6b1d68a8e90b8751124ebbd91024ad1da1fbe
SHA2561e076cea01ce02ffdba3f97ef9592a6ccd075585ef205c4d051f977438b4c77e
SHA5126c077cf329a00ea1a0c3d2438c8fb87dceefeea28ec5b49debcbbca7be6810b061eee9682f886458a98d2a4c79feca83a21f8491f3bba2e225423825ad338147
-
Filesize
1KB
MD50bfa756a289f681e7d04ecddc5ef97e6
SHA1af1c0938eb716af8afc3b1549b0218af61ea027b
SHA256bfc07156c421ef2662d96bf01563b9c2107a0d548f8c8c6d3a652cfde2748e6b
SHA5123319c379b5b5602c5713b17c7cb5d04d946d0192d1c60a7b1bfc6911577475d1e137811ae7eadc83d368a8493221b1c21306fd9072cf17ee78f76eb43317641f
-
Filesize
1KB
MD50b2e72c5214a0dd503dd1b7cceaed674
SHA12f2c189c34dacac6e17bd4f46721908cf9b939be
SHA256e59ddbd6dc04824bf69244887f69fa28b7692a3af2930e9f1730fbde2a53ef5a
SHA5127cd1c18eda2d5f060e5bb0ffe6b0b5d4b2ea2c3d171ca432ef27dee10238630ca41f19b8ab6971566f9a8783be1b86b364291811dc5e5f94c674b161660c9957
-
Filesize
707B
MD5a89cb186fd2de6f37376ba585a0dccf7
SHA179a36a89b0821713f1f4209be4596047bcf3edba
SHA25608a5f78584c17361c49460a50d06e37b6c61fe1858822b314ebe743a09396e72
SHA51263f78b5ca4776ee8c9bf1aa9bb058f65d06a80c65cae369a25b151b9054276f4db22364a9c316d84db11cfbb0987f5e641ca61c7e061ac9be8aa6f3693b3bf56
-
Filesize
4KB
MD569531fd8dda6b4f95d02a16333819298
SHA11bed3e05228dbf188530e3d8e9065cf517ca99e2
SHA2569a4f3468df9ac742892c754a4a58bac0ad9dd86b49e174f3c1fa74c5a3daa135
SHA512e12a57ae2f0b11bfcf1c74c58fb084b654450365fcfb9d905e74be401b4df6f49184c5482b956faebfb200af1e2758ca6f85e523e9f951eb2258bf810bd9dc58
-
Filesize
4KB
MD5c1de55c69033b6fa42a1c76b3658f959
SHA1a0a0d3656ede007e9d3776ca4ca89b2593369d1a
SHA25674c4de4f214a88ddc7defeb4b4810a6efbc2d0d2a3501ca13398bc41dd77461d
SHA5126ce5d69a1dc1e6609f7aebcb6db495b166e3334debe0e428734dd3180a7838da03287fe481079a770a57cfd0afd07b74d14f142108f0d34f46288f99b3ce1a95
-
Filesize
4KB
MD51a587632ce59ff34901e7f5895fb2a74
SHA149d684740e50c3b547d8dfe94cfc44f2f0f2d087
SHA25662f512a461fe903ce4da6759153b5f1ec6a3489fb8ef02eaac401a9db2d58694
SHA5125e95c807a23049e51566adfcaf5e4c0ae354832b435f59c583f37c1a48b60b3e5905a105d92dced7f4c4709f54de0851ba42ae70b3e2d7cff6de4d029bccc991
-
Filesize
4KB
MD530cf05d10ceca81fd10528c34cbce099
SHA1f9176e34838d52a9c75cc3912f29c8ec83b57dfc
SHA2563466154c2be03aef38a7166446ac0879284acc37589213b95520ed321435e856
SHA512aa18b621bc2f46bf85a9863d0c13512a0025b08b3344e428f225f002ef505aed2cfc8b0585f282f1bb2e5bdb470571429911216a3261ab9ef8665a66461e901c
-
Filesize
152KB
MD55ad034ae3281319d40d7dc66861b3fc7
SHA1d3246540d38cccfbe84eb907092a1e2981a7a388
SHA25646fce8b494b8881c3baeb0735f51aac74489c63b0a62524d59b48b39b20b5377
SHA512f3b75fec83c7c646da2761d73839fdf1c7552fc52de2cf8013e669359985eafc4abff398c301601dbf86876672afae29c05c59133d448452b1dc4487b3148ce8