Analysis
-
max time kernel
69s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2023 10:11
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133334575385057697" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4860 chrome.exe 4860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exe7zG.exe7zG.exedescription pid process Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeRestorePrivilege 2052 7zG.exe Token: 35 2052 7zG.exe Token: SeSecurityPrivilege 2052 7zG.exe Token: SeSecurityPrivilege 2052 7zG.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeRestorePrivilege 440 7zG.exe Token: 35 440 7zG.exe Token: SeSecurityPrivilege 440 7zG.exe Token: SeSecurityPrivilege 440 7zG.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe Token: SeShutdownPrivilege 4860 chrome.exe Token: SeCreatePagefilePrivilege 4860 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
chrome.exe7zG.exe7zG.exepid process 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 2052 7zG.exe 440 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4860 wrote to memory of 4204 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4204 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4344 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4268 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 4268 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe PID 4860 wrote to memory of 3996 4860 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://bhagwatijobs.in/VISITOR.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe44c9758,0x7fffe44c9768,0x7fffe44c97782⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:22⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4536 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5208 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3124 --field-trial-handle=1648,i,11929271747673387038,1365957374759403778,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4512
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1500
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\WESTERN\" -spe -an -ai#7zMap14113:76:7zEvent206711⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2052
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\WESTERN\WESTERN\" -spe -an -ai#7zMap12878:92:7zEvent310281⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:440
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\WESTERN\WESTERN\WESTERN.cmd"1⤵PID:4064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5508cd9971c5c1e66659a3259091cb1c4
SHA154e5dacc834ba0d298796aa502b952786754e4eb
SHA25623a3611a4d4e3a773818e63672b6029a85140f562d57f3e37021b2213386b3b2
SHA512d3167aaf3c202647e461ff76c2a2fd46549280839135652d47b9ef63275d613b9a9b6645e557c1f9e3e8b2b8f7416d056b90b3ee02c2c15806c42368d9dd09c7
-
Filesize
15KB
MD5662df84828f8bf0498d5a57c33dc3c04
SHA1733a8dc6dbb97b33c1e008e1b7d0c8310c67b935
SHA256d76c85112c23d3f238f88db90ec4d954f09287c654476fa33440f20f16e03817
SHA512ee2e33b73101849619b0d072f7d77e04c082dbfde79dd2ae0bf148e1de79a1c36434ec78eeeed698028ba6b29b5b9593754bc194ae3685e9834fc9aa0790401e
-
Filesize
172KB
MD57f08e8777185344d7dbd8f61a095d9c6
SHA102f51c7b3d803b7906bc11ae88845078c05bf586
SHA2562ab329935649b3d2fce5e872408f8ebb9996ff89adb247866aa6cc90af08cde0
SHA512fc7b96c9bdd4e0677389bd04491f47ced4682b33e93b2e6d95fdb80fba6aa69d323ea41cfef4ac0a7329055720ed35e268dbc664f4ddd270c0c5c66b2f77cc5d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.1MB
MD5b8ae580296be935fe8ee8e41a59335aa
SHA11f6dfb78f2a2b76174f9ce7b30d1f4e31611a84e
SHA256b76080d069eb6c4f941b61154852d2000dd53db0f120827b81643f0dd9480c4e
SHA512771123766fa2d893ca0ba1a03a358c17172f21181e1043698ed68789bfb370b18bddf457605947b7296c4d56ab6b89709a4fff47fba66034d19b4e603935889b
-
Filesize
2.1MB
MD58ddc595aff7ae14e5463f4b3b1c242e3
SHA1a741e466ed3f30cf69da87002c89f1ea47c5eba1
SHA256d6acf9ddac80e7a172ba6572365ed329ad5d831ac6ad8a47e8297706869b96a9
SHA512f8f9513185b6a0615054d0060928ea12cfc2e916b7a82eda74e283a67b563aac39eb293a7d453410d859fc0110e635e77359e87a5066f08eb88bd827ce8952ed
-
Filesize
2.3MB
MD5edf847cfbfe0ba4c161c815c16a73195
SHA1e7d8eb262eeb5a7f31bd4673d066bdf42761e90a
SHA2563b4a299904bd4683c3043b0ca84553eb9e55d6c5450e0346f0456e3fd6bffb65
SHA512a6aa8e181fba031d543a6125f6b9ee286a4c6c9829185b56cfeabb07103438573dab1ffe8e9afa97f7beef8a8d018239381d8daf3bf5525b2364317bdcad8884
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e