Analysis
-
max time kernel
59s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 22:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://khillracing.net
Resource
win10v2004-20230703-en
General
-
Target
http://khillracing.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133335875859295925" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2240 2076 chrome.exe 51 PID 2076 wrote to memory of 2240 2076 chrome.exe 51 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 2292 2076 chrome.exe 87 PID 2076 wrote to memory of 4620 2076 chrome.exe 88 PID 2076 wrote to memory of 4620 2076 chrome.exe 88 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89 PID 2076 wrote to memory of 4916 2076 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://khillracing.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfecd9758,0x7ffcfecd9768,0x7ffcfecd97782⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2788 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2780 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4812 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1896,i,12793421870829787471,14238357490053864662,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5332b4ab737cd4687bb9a0ed170202018
SHA1bbb49d9b02bba118dfb4c66e53df5e37cb9558cc
SHA256003a8dc48d039adaaf9bb857935499ae74c67b2af6a35c064b75042de85270ce
SHA51267d8dc375eaa1675272ac8b5795f87d88777e1d008982e60a5eea941bc4122a4d0beb392c993f78216905b9f02839070f9d2beb1cf51b91c51f77fe214161aa5
-
Filesize
15KB
MD5d298601e02ef42b1cdfc504bbafd4043
SHA1513227c1baeab7321464530b48bc2b18221aedaa
SHA2564188cc3ef2d8d1f6c7f77639a7e20ae4bc81879c787c78e491cbb2b99348dd29
SHA512433ac14c1b15324af601de845915dcde656504b4f65b379d849a2f7b74facd34f9b5a0712245004e136c965aabbfde3aae79c253c993d347e5173801d936a488
-
Filesize
172KB
MD5b95572ede3db0b4f088f64ab7b02850d
SHA16db947b352faa87b3c84d14118800ecf965320e9
SHA256ac8c07be6b4e9248c8ac5a7aa815c60a2ec6c5d138738f3b1198245ac133dad0
SHA512cc10ec2552d47bb562889215b1bf56f23493224d5f7853a8bda97caf65ade4644f0418ab389fb86477570b565466a762776d34a5111fd83adf4caccd0aa84359
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd