Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 00:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://link-hub.net/440015/m-vs-s-duels-script
Resource
win10v2004-20230703-en
General
-
Target
https://link-hub.net/440015/m-vs-s-duels-script
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.ipify.org 56 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342012353196288" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 3788 chrome.exe 3788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 556 4028 chrome.exe 31 PID 4028 wrote to memory of 556 4028 chrome.exe 31 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 1572 4028 chrome.exe 87 PID 4028 wrote to memory of 2592 4028 chrome.exe 88 PID 4028 wrote to memory of 2592 4028 chrome.exe 88 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89 PID 4028 wrote to memory of 3768 4028 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://link-hub.net/440015/m-vs-s-duels-script1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c6039758,0x7ff9c6039768,0x7ff9c60397782⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2740 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2748 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:12⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4744 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:12⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3408 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:12⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3896 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:12⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1692 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3652 --field-trial-handle=1864,i,228705898346900966,7146191843484076495,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD592f0bb21de86c6c660bb835f40365184
SHA1ee7dfcc9328ad0560e1d9fd6a035b8efdae3d7be
SHA2563eaea657e2d8557cc8e98102697e4fb358abfe10b4d95f8dd5cafd1585a2df82
SHA512f52731ff5972853ab4cf84edb84e18373656f77a3ca1054de48ffffbf452f77e930e5d15e1c6ed0268ffc6bc5651a5c754d237c86f73e40e4848b0f57c91d1c4
-
Filesize
648B
MD5dc59f742b3e7dd82bc5c9ed4e839fc71
SHA1c7aafae0e387b93d8a08cda48ecd07e5379b568a
SHA2561c30556f3dde85e89622c822aa705969fdc51915c4325c65182b0a96a6650e95
SHA51256880cbc823ae904cd1feb83ef94a83122116fe047198afc870849fc37bea614f2eca0021de3ef070578e6edbf53917e176c0ff4216d7f4d3546bec7f6537890
-
Filesize
4KB
MD5520a6cc03f56ef2a5a7cb358c3d70edf
SHA11a6670fcd32c3c5283eb0416652137fb58dda494
SHA25634cf7d609fa83d811a2a0a3b9177b9b81d587551d3b8db48fbd4b4d407d61b0b
SHA51234e9529d3c8c7d7eeb5e6e04ccac4cf9fd02be2cedecf1d93195ae7b8f5998898fa8b26a38cf91d0f06f0f2e333a36f917124f46454088420bed3c7308f019ce
-
Filesize
1KB
MD501fd0c6b04db847d5a17619474a61380
SHA1da192ff338aff8c7ff3191d79d6bfbebd5afa79a
SHA2564879a218fd55f58baf5c573dcdba5b63155c0ae4429c04ad90807c4d8e4ba9d6
SHA512d514a03cb21aebe5fe4593c06aa9785bf454b71f0e2111a831b8145674f4d3748e25e1c0db7cea065773f1c2a8feb75fc460e5885d00fc5f4a54e0a60a14f27f
-
Filesize
5KB
MD539962c58c2d8eb55d73c207fcbd2f11b
SHA1284388d5adc207b469492eaf29a43c0827e4a951
SHA256177fc03c85200ead58fdae0d49fdba4b63a58c576cf376c3fbf02ad865af7f53
SHA512f101c569c57f5920c1d6029712153a68ce06d3a03a207bc95c8c056d58b71b56f40232fac8d54dcf4d36eba2d077961b9549db67f82b6f60f53826866b8e5222
-
Filesize
5KB
MD5cbdd2a8416f1a2ae5cc5f48c0cb7d8bf
SHA18cdcad22b48123634adf40a8d5049c5bfb0dfc89
SHA25635415a6677653577009928b8cf230f22367fb2f2309ce30f98543d4295003e07
SHA512e4143e45b6179d587e420ffad8fe727adb8b7f377ef47c93a24fb76258bfeaa903125889f6ffd8118831cb9e7c702f5275450c3825a809a5d797231c4d9e1c7c
-
Filesize
6KB
MD52a679511818ea4ba35ad3cdacd15e73c
SHA1314589be9dc573cd70c7df1f29f764c810f36468
SHA256fe3915bac2f195063b1149af5a09f9e605f974aa3b96ed7db2330d055bb4defa
SHA512d498d1503577b95f84399c36283815e77988c3e7f8f73f5f92de90f62f44995d6f1fbcec88de34428df4515f7c09a3c403d92f4e411e8dc7c93b3576b972a1bf
-
Filesize
87KB
MD5b8aac52d25bfabe136531ad85d6a898c
SHA1b42407817397fc2551f3e98372e81fe7359a48e6
SHA256002e7d7bef70fa2b5fd8fda1eb8c299f97bbd912f88a1806525a7bf456e7fe34
SHA512f106df9a40c4ce0acb5ff33138a1f742746fd4e470832c5864eb1a91dfe9e8970a4294e7722b62f4177aeb4c8ac89a1a16e7b0e67f7c7af1527d844c3acacc0f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd