Analysis
-
max time kernel
6s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 20:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://6vx6qgwjf9.experience-healthy.com
Resource
win10v2004-20230703-en
General
-
Target
http://6vx6qgwjf9.experience-healthy.com
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2556 4888 chrome.exe 79 PID 4888 wrote to memory of 2556 4888 chrome.exe 79 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 3920 4888 chrome.exe 81 PID 4888 wrote to memory of 2308 4888 chrome.exe 82 PID 4888 wrote to memory of 2308 4888 chrome.exe 82 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84 PID 4888 wrote to memory of 2464 4888 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://6vx6qgwjf9.experience-healthy.com1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7ff89758,0x7ffa7ff89768,0x7ffa7ff897782⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:22⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:12⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4764 --field-trial-handle=1708,i,5416337336791024855,14133479685627910432,131072 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD53652545d1554f5054f5941ace2912588
SHA183394961ac257e0bbcc8b92ddbc11d087c06c216
SHA2562927122a386124ff3245b4a8cbe72305dcd7435c58a605eac0b4849b0715b756
SHA512a7c98e004e47636d19b17a758f1b03c3a0cf7ab6d1a6a8370e0af0ac61e66b9fd190f43604eab334fb7640b261b523978cc2258680579534e9e9f9b50fa8d4c6
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD519e27b6f21f3ef02d5897e573d5bd611
SHA1fd3232068a175e6003aedb65134410e34032480a
SHA2568ae74fa76801537e4a111d19babc40dcb5ce19dc4e175456bb2f60914929d276
SHA512a9b6e21ea24258d38808901633c4d912fe7baa202fa8e415cc4298c339c65d8f585b5af4348aaae0eb672b4308e992222561fdb5a41716c531b7e547bb612c03
-
Filesize
1KB
MD550ed3bf3a27c632c58ee3f98a57e0596
SHA161c60102e92282b8a3f0f4b2f8cee514b550224e
SHA2561c2b0e44f869c99da3bd5c132546db919a7dc675459e54cd8f7824fb123faece
SHA5124474cd4e6348951f47bbec2876b5378de8b622dc6cd967bf2dc8e229f1270f9cce9adf15c33310ff4d84f3f577caaec7c24c410c93f812c806b9fba895977b0f
-
Filesize
6KB
MD5d1050c872e5337fda0f21792c184385e
SHA18ec1a04c3cb35316d106abb588b1edea2e3fdac5
SHA2568756c4b8d2b12326f6503b90050bafe0154b20f9b109f0f45e5cd66429f7aaa0
SHA512a6e3378ad31cc821451a6759e317ffed9f51c8248d8af002c60e962af5c287cedf209d6fc5be06859db668a56febf3cef10fe7c0c0295d590cfc56145627343f
-
Filesize
171KB
MD5c7c37e7f9a9fd2b7d3b99f5deed2559c
SHA100f5218edfc863407a953455320ce19b94942af5
SHA25691034c7431155efae60530b58ab10886c713533cc8ddc1f593d993096116b6ea
SHA51243721f1a2471477effbf90957c8e10b342616d2290cf778b605902075a2e66eaf99fc9f5d28f2daa579ee4e38b1750d70050493cac1ddfa72266ddb661fc4176