Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ec2-44-233-33-191.us-west-2.compute.amazonaws.com/x/d?c=33357764&l=2aaff3a3-fc1d-42b2-a0d2-67faeb212395&r=0adab1e8-0f03-4b77-9145-61bd4f3c7f69
Resource
win10v2004-20230703-en
General
-
Target
http://ec2-44-233-33-191.us-west-2.compute.amazonaws.com/x/d?c=33357764&l=2aaff3a3-fc1d-42b2-a0d2-67faeb212395&r=0adab1e8-0f03-4b77-9145-61bd4f3c7f69
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337494754455009" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4884 chrome.exe 4884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4424 4884 chrome.exe 84 PID 4884 wrote to memory of 4424 4884 chrome.exe 84 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 1360 4884 chrome.exe 87 PID 4884 wrote to memory of 3304 4884 chrome.exe 88 PID 4884 wrote to memory of 3304 4884 chrome.exe 88 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89 PID 4884 wrote to memory of 3872 4884 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ec2-44-233-33-191.us-west-2.compute.amazonaws.com/x/d?c=33357764&l=2aaff3a3-fc1d-42b2-a0d2-67faeb212395&r=0adab1e8-0f03-4b77-9145-61bd4f3c7f691⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8722f9758,0x7ff8722f9768,0x7ff8722f97782⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:22⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2716 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3716 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3332 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1884,i,15393234875784000716,6052071637561583356,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5cfd07851a23d2c85ed57846d1bdc0dec
SHA1f07b110da5b530d870cce94f0a22695a89c7ef55
SHA256f5782a73f15a0d7817ed9bab34f87a73a9876c1e6c41d24313f94e99c2863e80
SHA512acdee9a43b011bfccb28bfc8f1656dc6b2758b13ff2b6deec6bb7498608b99e1a7164acdf2a76f1ac08b2cf923c473d18021f2e1008060787896a2782adcbfe0
-
Filesize
1KB
MD58118997aa4dc23841615cf37168e9e40
SHA16c48e177f7e6ad4af62c37ea37b82d19e659cecd
SHA256f5d516abccc1aec2ee6c78c50aecbb9de5a414fd50a266f336ebd3ec780b5b86
SHA51251c327796d3de023988f728737f060a920fc8362c969dce06e1e834068a34ca3e14522155a3aa6305e83cd5242d428c0c0905d5708614744e5bdef7058bac0b0
-
Filesize
1KB
MD5fff1624010e77384fbcc655974c3d059
SHA1d37cfb60faf20382966b8c2e4afb222fe47fbe14
SHA2565f9f06eece9b664ce9ee17db5003a7e35a2db09a9166cf2a1fa054ea3679b322
SHA5128566e15f07c5b86136dcebf8047581f205d87d78027bf6a44f629e06e1de1599a0d5e462183a2176fba25a8c2fb333ea3228a5039443f9af4677ade9f3e2a5f2
-
Filesize
6KB
MD594e8fef5868381ff963ff8dc5ac1a0c7
SHA1900c26343f59b8e92d3b3094e86c85bdcbb9420d
SHA2569eb9f981ac7b96b02ba225713b256c3526c187f01b278c0fc04b19251296f39a
SHA5123579f0fb64888c700f2832aa5c04d09a05daed53db4d210dbd0d6201610ee0919b2d21779b8218d8d21a2e61c9c67d3bf153ce5eb041aedd61c2e1ee064d4dc5
-
Filesize
6KB
MD5dfe4339c9053cede35a6fbf45ba39538
SHA1c4a8d4f79feaab5561abddf8e70ab808c4ba5f40
SHA256e584f97f4135707977a61faca7f274a31b3c46f0722823106312464074e56f96
SHA5129e9f0aeb98b59bcf4cba37915dcab9793c30e4d8f20968f1694702ba69e419c191f0641ca68e674fd1460bf5e6c815c3943a26f480ccfd2764183f977bca7258
-
Filesize
87KB
MD532947cd87fcddaee63ab4cfc9ccd34df
SHA11062ba80a8d2247c54f0f9039bf43700eecc6a3c
SHA256c374635dc04b89dbd4f85a64f3d84f7f6034364db9c666f0d6dbf0a6b39da9c6
SHA512539d9ffcf09a3edc19c97362b4679b0535397d113308bb9952504ff4407933bb81efb223c7e34d3743b4c6880ed4426ab35ad84b2c1467de8f40052cf43c8893
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd