Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 11:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://suntechville.net/
Resource
win10v2004-20230703-en
General
-
Target
https://suntechville.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133330318485645026" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3144 chrome.exe 3144 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe Token: SeShutdownPrivilege 3144 chrome.exe Token: SeCreatePagefilePrivilege 3144 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe 3144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4456 3144 chrome.exe 83 PID 3144 wrote to memory of 4456 3144 chrome.exe 83 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 4660 3144 chrome.exe 86 PID 3144 wrote to memory of 3316 3144 chrome.exe 87 PID 3144 wrote to memory of 3316 3144 chrome.exe 87 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88 PID 3144 wrote to memory of 1148 3144 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://suntechville.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff86f3e9758,0x7ff86f3e9768,0x7ff86f3e97782⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:22⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:82⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:12⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5080 --field-trial-handle=1900,i,11166354254554945860,6079181999776024923,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD508e75e05aca47c4048689752b33c180a
SHA182005618c9ff3a0554838da5c349b33581621437
SHA256fcd1b7a7e7904178c07a38154ae30a6a56f00388da883cda46040094a558c738
SHA512b4c63e0ad636c4bcac641f6c87fa215a32eebbfe2ae987840d5e4f1a45b0c7e50f0c9eb589fc213f7f75619fb6bab52a2265530f54006ba4eb972488e2871ed4
-
Filesize
1KB
MD5870821b54d4b6a4cba406b0eaf8317a0
SHA1b6bc191254f56d3789cd4d326ef2ca957983e9dd
SHA256356d64fe1de9c310809cdd79ed3baa601174f74e1c59c1859115fa56859b6856
SHA512ee024b23ae506381ed1942c474ef20e24924d6e9fcafc8cdf8009b952d47827176770a36a319f410380e0f098cd7091dd65fcc086d5e78734042c4e0a95e6f3f
-
Filesize
706B
MD57e14bf8c49533039887e39b288f3a753
SHA15d7b24f394e49937f3c75b53ae306f759c41569e
SHA25669bb07108356fea6cddfdd20c755e5ce9085b1f81f5435075fe78e11bdbbf191
SHA5120c0cad2758739ba896a782e42e311e2f5235228a8665d19f0ce2f53c4e030243a46689850d4b9c7e58fcbf58d51cb31320f2d39a282080102e73b43c4f13cd97
-
Filesize
5KB
MD538987e6a4238b450fe27801f272b9fff
SHA198c26eb0783a84f810b14c8435d5878c974b3e13
SHA2565da7a422644e1fbd7eac273c95e62554ea85b8ea3a01b6439dc72f64556aa4f4
SHA512c68a1ac256ee4af8718c22669ccc59da745e9c82521d518ba9dc4ef9ef769ee8f984a9ca5480368e720cd392d8574e7a4f5d0b864da9644f55850d6ed9638de7
-
Filesize
6KB
MD533ecd0953152febe0cf9cb1440b91c85
SHA1d86e954e1c27b708d42697a36d494f7aa63a4714
SHA2563480d57dffd9c9d8626fd402d967e0e2672ff70388af79ea309b198d70445984
SHA512d951c143612b552eb40aabdfe3dd7ec63bbb2d4e7f6bf81332f24a76f2d60bc6a90dbf958d1d7b981b476b58d4998fd7695abb45538f3d8a8452329d834dc98f
-
Filesize
5KB
MD5d5165b55f05370c425d02ee67e249be1
SHA13441ecc5aa7b5497eefc959348db9b5b91415270
SHA256c95edb341af0bde5a8921461e991cd5105da8b81447d51ff53650ed81d318a75
SHA512b9f922baec42d31644acb91fbb900fb1d0cd3489bf126c7f049bda3824c2de5e5982e5736ae1cc0fb701273f798311d051564d52ab11da6969588030fb337800
-
Filesize
171KB
MD5693cca0fd9e57c0a89602835c5e0e122
SHA1006910a6629f9a916060b65c4012464d22a85adc
SHA2564b7c20d5e5849464d31c6bd127fc841fc3e408901eeab7b2835ea4dfa674ec0c
SHA512e02e1d1fc37ceb1fa998876f15ba18057236d5819cfe03cce7eae63188cb9d7b4d7f65c8da68c5fa447e636150be995a95877284836e5094a87d90013e89b7ee
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd