Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 07:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tracker.btorrent.xyz
Resource
win10v2004-20230220-en
General
-
Target
http://tracker.btorrent.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133307697850026668" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeCreatePagefilePrivilege 3052 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 680 3052 chrome.exe 83 PID 3052 wrote to memory of 680 3052 chrome.exe 83 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 2000 3052 chrome.exe 84 PID 3052 wrote to memory of 380 3052 chrome.exe 85 PID 3052 wrote to memory of 380 3052 chrome.exe 85 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86 PID 3052 wrote to memory of 620 3052 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://tracker.btorrent.xyz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b2fe9758,0x7ff9b2fe9768,0x7ff9b2fe97782⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:22⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1308 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4760 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5116 --field-trial-handle=1812,i,114900714711025612,8313769308607949681,131072 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD545e27d9a2b75ab94362964e6c31ea167
SHA1282f6d29be6eddcb47b3a04ebf4956d0d207b55d
SHA2562ad3bc86870a1df73396c7e1b09fab24f9a5dde2cc643d0cd2fff6e9c48d7b2c
SHA5126edd029e79c10145ae60962020069325e3069d598277ee9de798bdf7d48d9b7e8d127302f479a18cb46ba3f5479b20c2f3c762845e5dcbabfafeb28c3b9a4d33
-
Filesize
15KB
MD5eba6f9a1edbf2b51fcfdda7147e3468d
SHA1a8bbae24144667783f13cb4459f97c7550bf4d71
SHA25639831d4d78236bb79f27104ccf68b803ba2d36e5a27a277b0db082b4ae9e50fd
SHA512c7c5e8583b5aa1cc2e65864bb4f627e5d37ed4db62addbdba7857bd5407ad86146f9cee8e627e60f3f35b8b7ba613e91a76d6dcda1bfe9514e4aa3d3b56f6b5b
-
Filesize
158KB
MD5b4d4e338c93b366fd7f7af10b5ef7378
SHA160c2be403d1207a2b1352c2590c7c9de47d11482
SHA256874cf002f7ccf4617d340c6a4b61ce4d513c59116e2cef3a1f10aba2cd6b2bb7
SHA51226bbb08591ee14cced9940111ba022e76f5154730088c0268e96dc4479b3d00f5a80b64d250aa5e4b735164550c15d36226b3fef4e07c1986b1ad10c938867d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd