Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 00:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://svn.jdownloader.org
Resource
win10v2004-20230220-en
General
-
Target
http://svn.jdownloader.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294544876337223" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4256 chrome.exe 4256 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe Token: SeShutdownPrivilege 4256 chrome.exe Token: SeCreatePagefilePrivilege 4256 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4716 4256 chrome.exe 83 PID 4256 wrote to memory of 4716 4256 chrome.exe 83 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4828 4256 chrome.exe 84 PID 4256 wrote to memory of 4672 4256 chrome.exe 85 PID 4256 wrote to memory of 4672 4256 chrome.exe 85 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86 PID 4256 wrote to memory of 4080 4256 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://svn.jdownloader.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebbc79758,0x7ffebbc79768,0x7ffebbc797782⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:22⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3484 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4364 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3204 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4580 --field-trial-handle=1800,i,11296366152953545412,3528088678022811355,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959B
MD5705dd2ff572467b8d57455c4b5ef79df
SHA11413f9d59bea0fa57eca59f361a04706ebacd04a
SHA256c4a4e70cc4f317a0fc5d1bc7376f69e7740cd079a1ab58cb0980cf6658295ba5
SHA51270e806367b445a9b3e02d1f924b9ca7d34e57e02dfb64f19290d5e9d34179e27721e75edc0a2f19334ec592e7f374a13f1c95a27eee1e470317135779b608296
-
Filesize
6KB
MD5b65e9cf4eb89c1c45887d4792202c4b4
SHA1e4408d89d108b80442f2a5bf9c17bdfb496f1149
SHA2560bab26c7e296f9d5f254696efbf5b40059edce010916b9d9405c1b2d64d33dea
SHA512da59b490ec60851f260411eed4fb772a513d33c179fde925e8e5209c1af733ac4bf6f2105fca961f0be9038da1206d231560774a1f247d3d91157ca8790c23e2
-
Filesize
6KB
MD5f738ecb205d91d925fb39b8a8924a595
SHA112939dbf18762941f0099c7b870a53fba47dd1de
SHA25632695384b4e8618d66f396cf05474a5bb67c4d362e6c54122898c297c9e19fbb
SHA512ab58d3cf838db084a2146ee481ee298a1d0ab53effd5eafe42f37403c71d1346697e5a9d35592ed2af12617535e703c966d747be67893308552ed35b7f6d058a
-
Filesize
15KB
MD5942edab2a614b3707bb4d65462be1cf1
SHA12e6c37bd1435b399b6e6155fd9b4d323406d902f
SHA256ef1dc73289c8484da5ba776e32e2fd869939bdf8dfd9f1ed2b0ad64c86dc0bdc
SHA512151079e18316e65094d740fd23ed4d00ec7bbb3ff538bd79274dc93b1a5074eb2c3e3ffa5e1fcd685dad0719693d25d04570b46ab92cab512b8a6d8c2260d310
-
Filesize
152KB
MD5503300723107fb471f5dad550404a99e
SHA134a057727b932c924abfea22bccd13e9a01efb0c
SHA2561d364a7dbaf5d5749958e85e9d7d80b62cd97d291a5b3d40def71defb5ec0658
SHA51201ce019817ca058edfe9928a3dc040d8a8d20a8ada58518fa6ab1a377e48e04dbc9bcb3ff3eddf3f0ae22d430d5e9514bf5f9c91dd6b39d8aeafbb2001b18f2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd