Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/06/2023, 16:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://rancher.3.237.183.161.sslip.io
Resource
win10-20230220-en
General
-
Target
http://rancher.3.237.183.161.sslip.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133305426391034464" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe 1956 chrome.exe 1956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 5064 4212 chrome.exe 66 PID 4212 wrote to memory of 5064 4212 chrome.exe 66 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 3544 4212 chrome.exe 69 PID 4212 wrote to memory of 1468 4212 chrome.exe 68 PID 4212 wrote to memory of 1468 4212 chrome.exe 68 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70 PID 4212 wrote to memory of 2572 4212 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://rancher.3.237.183.161.sslip.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbbf1e9758,0x7ffbbf1e9768,0x7ffbbf1e97782⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1340 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:22⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2000 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2736 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2744 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4400 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3108 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2460 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:12⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 --field-trial-handle=1704,i,14485948586615034935,14269872913027324878,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD58a2328a5aa74ff6eaa8bbe004555dfac
SHA11d2b3ae511e5f5bc1b5cd60064ed4a8ce93b5d83
SHA25614974dbe310351ed7502fb487321955c29946615053165a9597c79b17fbd4c4e
SHA51209de066a9aafe2e6d7ee15c2b15d820017e045ca52406953c20690d01154b7b20cdf5af5d2a1d9946415965a2fa8a510934ff3ebaeb5e704a3bfddc7d7ba88ff
-
Filesize
983B
MD57f039f4f25711cea55b3a079a5cee5a8
SHA129950f205aa976d601a731535e74ad0309894eba
SHA256c25050c4edbb053ccf0997f5426d40f54f4e3be30be9afad73aa6486aae41c17
SHA512bc9fbacea8d82e02b782b192befbf9d5773f3374a2aa3d1808eed390df121d2150b26a40cbde3fb39bb713185f6e1275e352aedc15b3bcdaaaf959eccd0a103a
-
Filesize
5KB
MD559b84f63765cd4c86990f749ce8382fc
SHA1d42cdf66f3855734bcb2acc0f78e22f260f2b265
SHA2562e0ebacc951081efdfd5c0d28e8d465a899485a704934372c7f5d5cb479f57df
SHA51204fd8f94bef1ea30a63267ea079b6e1c3afa02b0ca513e79e0d3471d426a931e91fdf3b511bae00654f962953c25d43697d1b5fc919303ed95f72e3131807c6d
-
Filesize
5KB
MD5d1c6318980e71da1ed7e71fba67d90a4
SHA1ad31e6f8147a5e5703f0c951bbc761a3a4660cd5
SHA256a8d51983dc6f1fcbfabe46058612c1c1093f22b5e85d51d8fb199532209c993e
SHA512f67ca90251c620540a4f3e7fedb2e1d4143d9ba8680a272366eb876d39b50ec40846ecc7a6484e9432b2fe4039aff718b58b649d2c78a77fec59797465f1a58c
-
Filesize
6KB
MD52f3dc19d228607c44d69ff5571aa2495
SHA1fc76c5a91bb831ea71181ca0a31fc620fd8c357c
SHA2563911d8d9fd50347398127f86dca3d2e47551b6a6402573cf5d413d69cc2c3170
SHA5124badb4439bc7c5a2be1ef6ca485553f04383de9bb90a34ed965d4a3f0e271529a9282cc2b5ad34fdf94e59f11607dab38e8429a26b5048848fd032a45d34aaf1
-
Filesize
12KB
MD55a5fabf735bac7365dc07a2dc3a570c4
SHA1bd39e209ddb75d64ee2f89b071fc9038747aae8a
SHA256737c80d6d15bf80edfc74c2296e1c6f50ee6907b866333198cfe7f8575b2f9fe
SHA512ab6e130f6736a26757c9ad09d5370bb839dc7bd8dcaf92310669f3c4db9fb4c6be7a977cf5d941dba916dacd594d72fd962bde94d6b89a0d1dd54d326cfa64bc
-
Filesize
157KB
MD5accd44b74e54d626b187a6f89d56fac3
SHA1d5779d0e29e68ee415a5a05c087178cfaf106630
SHA256748caedf55f24c1fcc83f9b01785c8feb931301597ebab873f08eebb3aeec72f
SHA512b37529a607a86d8058b5fd376b1d58837332d520821c8577fafe1dd512b8c77d4bc03752708d658624a10fdd54d8379b5983a31c352fc18c58120cf692a691dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd