Analysis
-
max time kernel
52s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 15:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://scrumpypoker.com
Resource
win10v2004-20230703-en
General
-
Target
http://scrumpypoker.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133335622504326838" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeCreatePagefilePrivilege 1340 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 4540 1340 chrome.exe 85 PID 1340 wrote to memory of 4540 1340 chrome.exe 85 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2304 1340 chrome.exe 88 PID 1340 wrote to memory of 2824 1340 chrome.exe 89 PID 1340 wrote to memory of 2824 1340 chrome.exe 89 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90 PID 1340 wrote to memory of 4836 1340 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://scrumpypoker.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ae29758,0x7ffa1ae29768,0x7ffa1ae297782⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:22⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3116 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4500 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3196 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2376 --field-trial-handle=1884,i,5272624489690076674,4423232272950978917,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5fca8df52e7f21367b320ca351d5f9ec2
SHA1ec0e3c53134873a1b392e0f0eb7762c654b37aa3
SHA256039ea1c64ad77e8bc1665a877e34fabb6d9a0832b44dde2653cfda59271ad474
SHA512388ae59a5b83aaf77dcc96d8530aaef00b52ed38026aa74adac1519e7be9db90649361d4a9923af2ed24dd7faf964889d876b4096329eece474fa9848e332c34
-
Filesize
6KB
MD5d716f37a6591dd8c8242659b1d9a216f
SHA17fbe5f506d2b0564b38ea9f7b9e2fff2ae41879b
SHA256f94d4705171156c5ee5eaeb5c32e553e95654e0c4a833e4e304a2729c80aad4d
SHA512c43bcc2b0b6edffb2b54566307de87c1270e62af400057aae6de898d90165561a41fd2176f5f90d625a38646c983e2124e33995fc9449c035a33278d84d2eb85
-
Filesize
6KB
MD50cc1f93806d08847d0c9149cff0c2a8c
SHA1349da6bd3cd6aae1ec0217892afbdc62b5577a1e
SHA256b2d43a0a734d82a56b15926e4b96a1315c21bbcc96e7c2ec2ba2eae21f3500fc
SHA512bd2a1c6e171cfdf48acb2c19a94a79e984173235fee2b5c2e88a8d6c1a63eb269b7110453a00a78a0526c0fbaa5c0d2f8967fb0413f85e109712630a0f3a73e7
-
Filesize
15KB
MD558ef112d3757f314651773a203609332
SHA147261249b1deed81f0e303f6119e22615f93520e
SHA2568a96201cd57e96c582cd88aa4cef6d8938e2a27b48d2a7fbc11ec539f22ad508
SHA51297840df090003b672ba53047ca71b5b3873326225c4a21c09c04ba60d09dcd9a1c7a3e69fd59f7f406f413f74f3bf4499efe2b9f2357ca819aa4b98c542ab17e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd