Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 17:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ox4bawc6qqmbc9.buzz/
Resource
win10v2004-20230703-en
General
-
Target
http://ox4bawc6qqmbc9.buzz/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133330517645015977" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 2808 chrome.exe 2808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 2716 4216 chrome.exe 40 PID 4216 wrote to memory of 2716 4216 chrome.exe 40 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4328 4216 chrome.exe 86 PID 4216 wrote to memory of 4832 4216 chrome.exe 87 PID 4216 wrote to memory of 4832 4216 chrome.exe 87 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88 PID 4216 wrote to memory of 1940 4216 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ox4bawc6qqmbc9.buzz/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8158d9758,0x7ff8158d9768,0x7ff8158d97782⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:22⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3372 --field-trial-handle=1900,i,4279353076000779640,2661985887799240283,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD587a85f6af257f1bea54cc26420c167cc
SHA162493e577f99fb0006c6994480538cd9ac59e748
SHA256f93882b5fd77f388669e7a4706b4ef968132bb83e5cc7af6ee2ed4bcc1b3889c
SHA512116c8a2c6b326d9bc6248ef45f7d7a05c1f79fba6858f8926bf1cae4efb67127a4a026dc07864c62a1c1d20a84625f25c7809ee16e39243ba34b272bcf012fa2
-
Filesize
6KB
MD5408978160de4e85c26d2d8b8ad737af7
SHA11418593e012f3ed969b4f112cb86543a03a94f52
SHA256b6dea62f380808f8e1a259463fe099dafc1bd22701a668c946aa8337e0ab4e15
SHA512ee5ed7f24bfc688777a3098043e433a214863d6c2ee1634bb0b22deeca2c6ec3d0fbf666228e714465f82acabb5b187358fe5bebf4def78d693029773fb5e6c9
-
Filesize
5KB
MD5cc84f4725011daac8eb47b0a68eeb5c8
SHA1551e9ae8af119fd9bda6c952e509b20baeef1d72
SHA25680109267112b6eba65132617efcd767c04f7ea1298733dc84203ae6946a9ee62
SHA512fb978064b58b8d585b5c8a0afef896d2888d5307a5ad0112386096631e7955c84dca83a8e0ac948e425d84b6b9f6e72af3023fd07837ae69c59b8a2ed3bd9fe9
-
Filesize
171KB
MD5a795cc9bbefc6e690ca9e9d3dd5e46c6
SHA1a0d3af99915129eb3347f7ac9432b5cfd68f93fc
SHA2565ec03dc1114eec41ec579816867eed22ce9f80cf9bf44e90f05daafe97228b18
SHA5123d2b8eef55cb8c4787ca2946f161b891f07e8bcb9cfa021d9590b82da096c03e8fa19e51e0352b0c91f704394a151ed3b75c481d1ee5f6b19d6384c521dcda2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd