Analysis
-
max time kernel
495s -
max time network
506s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 12:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://niursdelppbp.com
Resource
win10v2004-20230703-en
General
-
Target
http://niursdelppbp.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeCreatePagefilePrivilege 3056 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2592 3056 chrome.exe 80 PID 3056 wrote to memory of 2592 3056 chrome.exe 80 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 404 3056 chrome.exe 83 PID 3056 wrote to memory of 3124 3056 chrome.exe 82 PID 3056 wrote to memory of 3124 3056 chrome.exe 82 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84 PID 3056 wrote to memory of 3236 3056 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://niursdelppbp.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb25ef9758,0x7ffb25ef9768,0x7ffb25ef97782⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:22⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2808 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:12⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:12⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4840 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=744 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1900,i,7189973480942728073,12356062347528929620,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2380
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c751a39782630414064020b4b63925d5
SHA15658873c7d7f1e7829951d611722562ba0cbfc45
SHA2566aec96c60e48ad83cb692c5b39754b39937b6f821325c6f00704f22be31369d6
SHA512f12fcba09a279f4bb1939bbce0d15e296447e4e1fd254120fba938e055d261d8e0eca8059c06f96de078708dbd0952c5936a1ff7965436eeb40fae68689d981e
-
Filesize
6KB
MD5eab3d51391fc120d5671e3b32bc067d5
SHA1becdd20ab51c32387fca3ee9bffccd5c04ba666b
SHA2563ac6d1b75f5acfd3f3026e85700629aaeffcc7336f389d66f044d79c4bae1725
SHA512922a5af467ebec89e4bcb7506ab1785fadb1198baaeeb4fbb9c4193c6db4c387343ebd814531d20d57d73e2a2ee971b512dd09ed4a063ffe1caadfba0863320a
-
Filesize
6KB
MD50fffaa7fd603cc34faa2cbafff5176a2
SHA15f52b57e8d3a1b9a4d743fc02a4b3f46905752c5
SHA2562f6b778d17955ae70690ac9823e431060c4ac84114b848e194ab280936f09143
SHA51203a7e5e68abdcbceabea7a2ac9ab56a583862c2d67c7001f2f0e2c799e9c41bc0dc7fdb7c50371a3d550431e470d3c20754b142226765a14d00166b4ad174a4d
-
Filesize
87KB
MD50e88aed53313f564edce3744db9ed300
SHA10b964246aaa4323b65588fac9878782f4c91ac75
SHA2562eafac5a6cfbf3d5117f6fa299e7f91ccad67d2254d1baef0f13993cc30f6225
SHA512ebf9c390e512cc01154771ccc6b6d086998fa49bfca812c00f53823c6fc69644334a8616dd363a28a915d01bb2bae59a6ebf33b0e632ff3e203dbeac1d0447b7
-
Filesize
103KB
MD5d7e9b751f6e5a167e46cf5320ab7872f
SHA10ed8aff03dd151b4877ac4ceb4ce3afcfb48e464
SHA256fd9c1c59c8f1122726a6a4ea686164c6730049018dc79c034523654b0f90d547
SHA51298ca4bebcaaa369a3a84b5e5e434fc2a077371e176dc72699d313b754aa850dd5378488f4f78d335fec2efee4e6fce0131e94ba0086c1c1db57af6e2fb1a3f8a
-
Filesize
107KB
MD5b3182691cafe5775587b14795d34d943
SHA171304d2d47fdc6be750aead4de799edb45641689
SHA2569a0a4b03decee4f4d2967ecebfd55a48087a7f950017d862382bbe0a8fd4bbb1
SHA5123865d4156e5f4b587be1c60494b2a0b36a408cbf9b7d494bb2fe68e1145c21c0e7b9598aa8c07ed8d290a2b46e0fdfdf53c564a47a1451c4d7c3fc60a4c737ca
-
Filesize
97KB
MD5b8b6bb5a8b26178cc507687826920fc3
SHA10c5ac1978da0bf5ec9abf74ffa2cb151eac38ca1
SHA256e620c39d98e47783beba9da46d71a3019c22bd129097f7a8820cf16e41067d83
SHA512b15bea8d32ae8a6c6aa5fd4ee54d8d193999f1a65e241ecde2331a1372bc671a45377ed8818ac1c0b21075f38e7905929ad35760da9982da0b571dff98b8d496
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd