Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 16:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tovestoogfirbeinte.blogspot.com
Resource
win10v2004-20230220-en
General
-
Target
http://tovestoogfirbeinte.blogspot.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133306298185667736" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 804 chrome.exe 804 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe Token: SeShutdownPrivilege 804 chrome.exe Token: SeCreatePagefilePrivilege 804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 3676 804 chrome.exe 82 PID 804 wrote to memory of 3676 804 chrome.exe 82 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 2672 804 chrome.exe 83 PID 804 wrote to memory of 1840 804 chrome.exe 84 PID 804 wrote to memory of 1840 804 chrome.exe 84 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85 PID 804 wrote to memory of 3468 804 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://tovestoogfirbeinte.blogspot.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5af69758,0x7ffc5af69768,0x7ffc5af697782⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:22⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:82⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4436 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4932 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:12⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5368 --field-trial-handle=1828,i,17046366526718894107,16536072279181420250,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0c382195-44b4-42a8-a39f-6c05d551fb32.tmp
Filesize5KB
MD570f911e438130f8cb404417d7c0f109b
SHA160c7da9f1d66d04bdfadf9d833611f91f2c44f8d
SHA25660f5d8eff06dfda8c6d985b0a7cb55dd42b192ca2707c7a5df07a0b37158ad22
SHA51288abe20a0b520dce08e4dee2f60b29859e078e99484687cd7a5418c29375254df7a522f5f0aa29ced80772e7e07e827e3a368fdd125f13eee92320b8e648d66c
-
Filesize
21KB
MD5f8d8a2656015d2e450a0962e74ff1c78
SHA1e0bf8df307cb208fbefcf382150a625dcc3dbd81
SHA256bb3729cb43aa0a88967d8c9942e10ff9926d67a0d83dff5f2f9432a4c6d993db
SHA5122ed5549ee914f4c7a9181ef70b465ed9ebd41b4a1710505a75af07d1341fb3c11c853e0efdaa1300e7758f4998adb505c32ddd3554c34b165635da8b0790f648
-
Filesize
312B
MD54b96fb5396fee7c182c6679c41b48953
SHA170bff06eab0c9a944c533b0e649ef441cc0fbc82
SHA2564b573957e4b6962d9f97affa0e2ff9fdcbb7cc5a6a6bcaa3a5fbe0cac3c3e958
SHA51296d903b48523270f04c092fbf3e9ae7476e93fa1897bf09497b1f9bcf9c2b1bfd0d59e9668f152016f74083dded35bd844acfe11ececeb7396ecbd20ab51a461
-
Filesize
4KB
MD5fe3c6d7bcc3e8084cdca94b104dc1c8c
SHA18491b71f627b2cd2e5e8c94ada2ad0d5a532b7f9
SHA256e63163da705f61a744e26ea5a039acf5dd076ee9732577410a97d49659c8a3fa
SHA5128dff9c6da8d9e2698e1a71b780b17661a2c7cbab60ba0ed2d15b759a23ca231ac92aa778f0e7f0e813fa4377d4da39445a9658a940c84d0b1d2ee9ee46ac94a0
-
Filesize
707B
MD581fb3e73655e26f0c583b2ec91c22ab8
SHA19f999334110f064b67e29221439b0ca907eaf544
SHA256d26131a19ee1f75e2fd2c1c43c2385bc442397c1d4c3f24d4d01721fff507c10
SHA51239aea0c5aa091f513b0434f87ee580b7f50efd9baf24d35b840fd39b6bc1970da4ce1396022421def03b5b58738aff8c2707ad1636c4400d1dc3f1b44de79d44
-
Filesize
5KB
MD51d40a2ae0197348ed940847cc523c932
SHA1c106a3f0bc0f1f6e3790acf1193cb6c3b01f0adc
SHA25666b50fdb0cd20538a92848007fe3a824e771a5e5c9594698009c5b1a0a8d7b4a
SHA5128fca4a9bf47d8fbebe8c77232c1311b20fa7cefa7bb51a49b006bf1f3ca012763d3253c1be58b1c99ef49985c2d39a05584e4f858ba26ee302ed55882b554a89
-
Filesize
5KB
MD5e15c642ee6edfda323666057c404987e
SHA1115459871e254e19cdced02f41883589195dc869
SHA256c90feb0437d8872ff962c9dd083e8005590ff33542f673e2c9b15ed2d9a14403
SHA512ad38164d57a1ec462f5b3801c241cb90d25b41efce69d1abe14d11a9c35fba89dc39ef207c04d6365fecc7517f6efe520209e6ca2f398a431732edd7adc52223
-
Filesize
6KB
MD53f1869687174926a7403700cbcabb4a5
SHA18ff9c9087d0d5b9591e18dbfe6ce2f6a19ebb70e
SHA256096a4c44feb371662a5c31faac50df8bffb6a9adbe7601a9ee925453e821581e
SHA512292c9a523666df6dc1a3eda022a4d6f54247a77c1e29e1724859ed06551a0fdbcdc507a8217d8ba5f8732026cbb9afd96b4be194251b535e7519ef4681b60397
-
Filesize
158KB
MD5ee244d6b6ef63bd1497e8abd4d4c4ce0
SHA18c5f163512b3758be73c35d2e5f1dd7b83353f63
SHA2567859b962f088adda9d4cee05bd9104b19bfede861573a98b10f5dd1b15d75a20
SHA512f027e3493d4ad92ffe025d903ec1ca91d4aeee2bdcb054d0c4dbe532d06780426e6d8d4eb0e6c8cea459c84bed81ff0b7025b8f8b5a6cb76fcde48ebdc712050
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd