Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 12:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w3ll.store/
Resource
win10v2004-20230621-en
General
-
Target
https://w3ll.store/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133328618679351675" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 3664 1708 chrome.exe 78 PID 1708 wrote to memory of 3664 1708 chrome.exe 78 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4728 1708 chrome.exe 82 PID 1708 wrote to memory of 4788 1708 chrome.exe 83 PID 1708 wrote to memory of 4788 1708 chrome.exe 83 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84 PID 1708 wrote to memory of 4312 1708 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://w3ll.store/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb488f9758,0x7ffb488f9768,0x7ffb488f97782⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:22⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4536 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4868 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:12⤵PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5368 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:82⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4820 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5404 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:12⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2804 --field-trial-handle=1760,i,5531675611599675369,5624992981532201096,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3c21e7c9-05b1-4799-b781-cd4393da4deb.tmp
Filesize6KB
MD58f75c57906d154fea70d3da830ff9759
SHA1a4fcf27e9cf198333f665f5feb76b300d83aa518
SHA256262bbda1651fb5230b8aaa03bd35d9706d5a5a39811ef02d611688bc5c562bbb
SHA512f49a6b2a0d29da7cfca783653dabc8692a445b571e72e4f018421c39e9475c1045a2bc541e623486d6ed8d46d733b6b7fa1a6744ff59c133d039b9bfeef663ba
-
Filesize
171KB
MD57a88e1edbba1ad7bd345eb14f1377a59
SHA1b299cf2eacc2d17d1f2fbda9391079b6f05fb022
SHA2563f6aa29738172f431b8e2af2e39cba0c2f91583d7bc23f988c7b7b35975bef2c
SHA51248870540a5e7aedf4513610e23dad5d37ff48dde92909345771f7235d4526893e65d11915b46191e62dbe6e9bed4626215703fc90932bdebed356568c1557f95
-
Filesize
456B
MD520068f3bb31a9e5f52cc966bd3d4febe
SHA1871ac60dfc61bf0b54b682662bdf8e733acdafd7
SHA2563a61b555c6072db360ab3bed8183e9b57c7d8854beeff545228efa1d5624b6c1
SHA5121dedb7a669ae8630bf0e0c139367527357a1aa44ee11a455298762d2da8f5f2026a81de615e6da460e197bede2634dd90032f86df75cc4a1a724d3234eb4e70f
-
Filesize
2KB
MD5b368643b9af6efea092b56a6db83ccae
SHA1e04a02d180c61f89b801ed1c4a581c0856b758b7
SHA256493e0970c0326be073630bd8a25dedc5f59ac0c019d4411299a0de4b8eeab0c0
SHA512165db53696a73f9fd787f3c920ef2b17a48f7562c9a78a38318def16f53dddb3eaa9acbc6c9405ba944ea5d824a576f34a674482968ed6dfcb36a4db773e3c20
-
Filesize
6KB
MD52fb64ee7091c4f69967dba681a1dae60
SHA138219405012f795808569e72bfbbd465f686d975
SHA2565a8b800df6f79006727ced08a3f158fd9c458dc95d26c185d5127460de493456
SHA512ad91bf71e2538ea4ad67a6f43585c0a2eed65ebb4ee33fed9dd0f7942273649f4990cf55fce546742c9cd33be26b97b2416fb73e58f9507f66e7ecf92a9e50df
-
Filesize
15KB
MD58c4ac647a7a1656ca13ea377e5574bbc
SHA18cecaa5939b5874d7f909531e3e36085f317e88b
SHA256dbe6af9b425809cf38e4dd4e2e6f30051d7d62c34530cde45920d0cd54e4bdab
SHA5120ea1708aaa8e16444993c77c5b18161d78b255f1214ecff94128900baa7e810d89fadbb0e75a295a56451196b2d9db61bfb716008d995f6c4b58111283bb972f
-
Filesize
172KB
MD56a7a6c13bf38f97b1e9aea939190945b
SHA164a7568e1c8e9a5a184d6fb8e99a4a256a90a1cd
SHA25666d9f98452a0f62082a0f568a9c98d725e248fc9843375f73dcafa7e311f607f
SHA512f4ecf25b571ea1417d2127bd746a4d5cfeb3ecbbd3f37bd3e19486538757f632d01836cb9f7c30cc8eb6d29d5de1c26fa4fda842493e99f7a6430a851ef8f8a9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd