Analysis
-
max time kernel
360s -
max time network
353s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 08:22
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.io/ipfs/QmPGGQWA42BCuPsxyoMdhzM7GLV4BwfaTQwJD1xkC4QP2j?filename=indexbus.html&[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://ipfs.io/ipfs/QmPGGQWA42BCuPsxyoMdhzM7GLV4BwfaTQwJD1xkC4QP2j?filename=indexbus.html&[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133312909775670176" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 220 2708 chrome.exe 85 PID 2708 wrote to memory of 220 2708 chrome.exe 85 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 4548 2708 chrome.exe 86 PID 2708 wrote to memory of 2320 2708 chrome.exe 87 PID 2708 wrote to memory of 2320 2708 chrome.exe 87 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88 PID 2708 wrote to memory of 1732 2708 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ipfs.io/ipfs/QmPGGQWA42BCuPsxyoMdhzM7GLV4BwfaTQwJD1xkC4QP2j?filename=indexbus.html&[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92acd9758,0x7ff92acd9768,0x7ff92acd97782⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:22⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 --field-trial-handle=1696,i,13904905158160488878,12145474989631483621,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7c624d2d-c4d8-499b-90ad-8c10f2a88533.tmp
Filesize4KB
MD5a42bd94daf0f31344aacf303c139b94a
SHA10715562ca6a2c877d8b67e4150c6c4e7066abee5
SHA256e176a4f3180b7a70367cfb7c7b1bd490d7cfe3f8da9c96c0b83388460ce4fceb
SHA5129b153f62ac9a0a80f60a4846e69ad05fadf01dc5bd4fcd91fd4deb61277ce40ba8e776cafa4871cf0d3291b5e3d380eb0e61c645fdca26ce2606ea215cdca100
-
Filesize
96B
MD551a0e79d4a0aac0705f75a1efc807f7f
SHA12cc182af1d30e513a17e25165e3d5dae35856ef3
SHA256c9a0685b0360277648c92e5bd20d998edf979284e960c5cf89030546c2c5b1e6
SHA512dcf358ccfafea4f5851bc1e6d8ed435ba9b273e0501acfff295046867d25fd38c9b8699b8beb98c10d9ef1ba1066a481f99aebf62b5b563f6e3fcba5ea91b1e0
-
Filesize
1KB
MD53f9e82657221a4d3aeb188bf500d391e
SHA1218104acf4b2dc7e67bf3e48a061773fb40798af
SHA256b7edf307b61b9ff934bb504ecb41268a6ef9e06036d4e60be3597a79d89fad1f
SHA512fa1ec886a44c40ce94f3095f4b2eb8c166db9318081243fe2c02e3d7781f875af81f2232c3efb1d2e25e8a3f3e1ce5ea55c99783afeb32c5bde20741d8e62f66
-
Filesize
706B
MD529cde3b6d3469be37c99e3d866398191
SHA15fdf6c88d870df9cb3cda31e0c860ba890bb92e4
SHA256bea0b713f2823484d053969227e7148a176e12994c3eb87e30bd936afe029f34
SHA5123e42bea29c0bf37e75cb311bb8b79cf63ca4deb7a06fb94391afa7bfac74e9cdb09244a8b374287ebca35cd81aaf20d6217464462e7785cb1c9abc3e36fa0780
-
Filesize
4KB
MD5a6fd1fea27db293a69c668c86a940298
SHA15585b8368e20d585a14e97071137929e7ca93628
SHA256b962987c6c2e404553b909fe7101a2ce69baf4d38b620ce0b09bd66fea87ca59
SHA5122efad5627a7aa924ca67a46bb3cf314709e84e7f24b3136677c58d0c5ffd03a833978b27cfd1ab1ee947a87a79c1ab9a07e0cfcb61841652663455087564caf3
-
Filesize
4KB
MD508bc7e3ce20a02dd0958e5493617c44f
SHA13f30dc4c05c5a10dd0482be64bd5e32c0a55a2d1
SHA2565e3a6c57388a2206307267d0e497e26f9f38cf256a3b6eb3bf109e0d19514ef3
SHA512ab2c561529d065cd5f02d806ac1a5268ac3333094060cc9147cb54e99db8accd97c8cb0bdd130af12a59b7c950337f95581dd22a2e786ae582d0a239e6c446df
-
Filesize
160KB
MD541ebd450da8a1ff6fdc8548ca3392986
SHA18015146c3a3a056a62be5f1c6e772f0cbadfafbb
SHA2562a43a0e68b0c8a61de26c5fd7ec459520cf6f45eb7fa34e1afdf1a48e188abad
SHA5129294ea5bdf00d5d250763afa273ce53c25cbc636f5ebd900b58c925cc898e2c1df629f99772443a775bd0203957bf2fa41db20484b96958c2db5fe2dfc85b7fb