Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 05:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://peachywaspish.com/watch.944325215980.js?key=16e2a34e20dfe7458d21cee33855e3fa&kw=%5B%5D&refer=https%3A%2F%2Fenvy.ij-scan-utility.com%2F&tz=8&dev=r&res=12.31&uuid=72b61a2c-ce1e-474e-8043-23ea682ac66b%3A2%3A
Resource
win10v2004-20230220-en
General
-
Target
https://peachywaspish.com/watch.944325215980.js?key=16e2a34e20dfe7458d21cee33855e3fa&kw=%5B%5D&refer=https%3A%2F%2Fenvy.ij-scan-utility.com%2F&tz=8&dev=r&res=12.31&uuid=72b61a2c-ce1e-474e-8043-23ea682ac66b%3A2%3A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133305045103955337" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3852 4812 chrome.exe 83 PID 4812 wrote to memory of 3852 4812 chrome.exe 83 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 1488 4812 chrome.exe 85 PID 4812 wrote to memory of 4140 4812 chrome.exe 86 PID 4812 wrote to memory of 4140 4812 chrome.exe 86 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87 PID 4812 wrote to memory of 3652 4812 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://peachywaspish.com/watch.944325215980.js?key=16e2a34e20dfe7458d21cee33855e3fa&kw=%5B%5D&refer=https%3A%2F%2Fenvy.ij-scan-utility.com%2F&tz=8&dev=r&res=12.31&uuid=72b61a2c-ce1e-474e-8043-23ea682ac66b%3A2%3A1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d37f9758,0x7ff9d37f9768,0x7ff9d37f97782⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:22⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:82⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:82⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4844 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4932 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2428 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 --field-trial-handle=1796,i,11100992013220047974,14657439444698574983,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5bdb4ea72f83c88c20f3b536b0a669611
SHA131e5ede0772eefe0a868066d09d8f45b0c624b71
SHA25688777960ab122be4afdd29b5c93c88e5a4d481ad9e77df8e9f99d8570e451d3f
SHA5121deecfb0b0cb162ac0ecc99051103117f367f9c5976b3207b628dae46eb9e9603cf2ed472f3841b60d700f056330c1826e9bcc817f6b90e4128b704076e7c32e
-
Filesize
2KB
MD5af3bcdcb53f8d6ad5c43903810221142
SHA1d4038248a324ef16a6a65cd50392068240fb370c
SHA2560ab7b4d72ad622d340c7db4a71e8bf03685456d8aa51389d24ada08ffba2d6ca
SHA5127a74405409691bf9d43bff25ee5ea39f202c854bd5e684cb6a863b5989183269d20a1d46c1e90d1055ac0338adf5ae09e00608a000d7098a28f34b4671a4642b
-
Filesize
535B
MD5f531a8eae37e59abd29aa60fcaad3a89
SHA1ef77ceaa19f458fa242d2a00b47ad73896b3c22e
SHA256f8f363e9a01bc3a9d9d0da42f40bcb20b30d8f4736c484839a0e8b6c96f58d35
SHA51206af3e8f779ae23bb435da38c00f5b900e9b9a2e6e8d14b4e5af0b1c4229281458af02236d887a43bb36d6334d82cf1855da067e1856aee1afc6965dc73811bd
-
Filesize
371B
MD5d05de6105971301e54221c2b3db9ce51
SHA1e8ffee98f505bfe9ac530e4d26ea6c0445e5d35c
SHA256660ba1944061d3b8b1b7557c135fe664e92694fa6e460852323b049e0a403f84
SHA512340de0d1ac0b8815ad21e86ae1481d092136d97b3a91db3c43828201d655d62d8af3042eb88ff31c28c5eef26ba192adaa40f34af5ac660f577e45c66f93319b
-
Filesize
4KB
MD5d90b13cd4d031411ebd5bc40b03355f0
SHA1e628d2e1ab9c3caf8673a3b8067a344134f21788
SHA25692397b6c898d610484b104fce43e9fa4cdc3584d3d7b0b86c46ff8bbab66872f
SHA512fcde6da0540abc75ae430fea01da5e84cfcb43f1fe3cff78f420ec01736c51d8ae94c257618f39611169a20e2128da5ff1a5009f76c86d9ec2f675f4842f286b
-
Filesize
4KB
MD52c3263ed906c3d3dff8274a54465d6fa
SHA1cc9e33f574af67af96a8ab4c7d198205e475c327
SHA256daa2c9397895475279c07517d5de8631a9ad0d0f28561caf91a625b8ee7cf668
SHA51296995abfc053f57c73ff6d82a1ff2e71a931602e4f2bc2f9b90482d9ebe9350cd9046253dcdf634421fecc18b0a1790ad4462037ecff7953482f1b45d7dca9cc
-
Filesize
5KB
MD591402fa53a692ebce24082cac1796aa7
SHA1619ed995e62f5a6264c084916a59a459f17d9f7e
SHA2568e90d1f3f8dd63759478beb86b45fd4bcf287e781a81591ba0311ef5ca3f97a7
SHA512ec684305a65fe48bc315fe866197392a7b593b4ebc6de1471213d76906dc36159a94055bb1c81f10b6eaa3709f77a9bc4bd2fe1a39b903c430c0a7baf0d8ec7c
-
Filesize
157KB
MD57852ec36d1e3c812155b049d2aee348f
SHA164ee41dce97280cf8b4f9a6404d8bad49ac7fc58
SHA256369519a22b3b82f255d4a63a556f7f09b4cf514716e9c0ef3aef12bfb5241315
SHA5126c232687914b6e45b1b3162f2de12aab99fd910592c92052527239bce474eab28ef1af5f6cf6c1ec285b1f46b29d0cbeca859af893ccf455fc1e9afbc87145c2