Analysis
-
max time kernel
20s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 06:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://7ya1q.top
Resource
win10v2004-20230703-en
General
-
Target
http://7ya1q.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4232 4920 chrome.exe 79 PID 4920 wrote to memory of 4232 4920 chrome.exe 79 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 1760 4920 chrome.exe 83 PID 4920 wrote to memory of 4476 4920 chrome.exe 82 PID 4920 wrote to memory of 4476 4920 chrome.exe 82 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84 PID 4920 wrote to memory of 3368 4920 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://7ya1q.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba6759758,0x7ffba6759768,0x7ffba67597782⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:22⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1936,i,17502916439766671687,6655863044839921453,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD525f493bcb946e1c4cf0af8fa97a11213
SHA12fb6155629f1c7575c4369c3354603ec99c9d1ff
SHA25684a77e3e7870fc1f446e48d99c94d06b8ce987138fe47d644b5ca51c54dbb3ae
SHA512bc77f0b0fa0adbbd548e7c15e4423c70c42aa592ffd602a63afa6df88e771ae5581764fcdf86918756a8559f40f1e1792a3731931eea422bc731f6046b86ac9d
-
Filesize
90KB
MD5daf54fe9763bb8905bdddcf4bc9caf8d
SHA181fd9fde98c1307582ee91e1554ed5edf3a2fd1e
SHA256e086e9dcbf08801af0a115d1aa8cbe0eb6d93eb2c129594e433a5c7452d1e1ef
SHA5125341115999068cf5b885e2a9e4d204e2eb07c6de37f454b801314b8cebbe3b0666ef6ec2dc21d3599243f0f8127637271b8bd63fc3ef357f361706d4a12e4d50
-
Filesize
89KB
MD54148bd4da77dcdf19e0b2bb24019e1c4
SHA1de477e09752b04e9577a979365d709e32d51850b
SHA256a25a9c6c36f33fdc63774ad524bee8686a480f18de60a2321b91f84eac92bca6
SHA512648778bef642022390f94e2026fdfcde9326a8aebd683043cd8362e09d949e4d7aa0e19a4f1c5d1889f27c1d9e07df0729bad3e8856a734455eeda15cb8ecd25
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd