Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 06:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://aptracking1.com/+?y=49ii4eh26oq3ge1m6hj30o9l70rjgc1g60o32pb561i3go92
Resource
win10v2004-20230703-en
General
-
Target
http://aptracking1.com/+?y=49ii4eh26oq3ge1m6hj30o9l70rjgc1g60o32pb561i3go92
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342234590266551" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 4152 chrome.exe 4152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2128 3372 chrome.exe 59 PID 3372 wrote to memory of 2128 3372 chrome.exe 59 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 3004 3372 chrome.exe 86 PID 3372 wrote to memory of 4984 3372 chrome.exe 87 PID 3372 wrote to memory of 4984 3372 chrome.exe 87 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88 PID 3372 wrote to memory of 648 3372 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://aptracking1.com/+?y=49ii4eh26oq3ge1m6hj30o9l70rjgc1g60o32pb561i3go921⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa45869758,0x7ffa45869768,0x7ffa458697782⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:22⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:82⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4724 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 --field-trial-handle=1896,i,9399263837228690380,13022809371770988692,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c545d015d98d802046e399954c54e7b0
SHA1ac00bb2a5b716735e0acd799a8b588ae2a4953fc
SHA256ef316cc7da788345745e20b20ccd5388069e266b1aa6c8878afde9539b46c7e3
SHA512103dacc09bcc0af6c13d1059c3147b8ae4554673802bbd7437cc09f8f0cf0389e2db578c9f216defa4ddbf3c880746d760955272e8fbb871171c72f379fd7168
-
Filesize
6KB
MD5080d5b2479ff0755a94cdd79859930d3
SHA12acf014ba59104491ae25d89e76a5ae650e9fbb0
SHA25633291a0c136e98a1e8a1cfed750df1887c801a220a8a216f45a4de3dc61f7ba3
SHA512ab65e1cb6c6392a181a6c0c36dc1c2527de780d683339d4aedd62424126288567fc1b840adda856f97ba6c0c5a6496a10fabbc2ed694fce6da7d09faecfa73d4
-
Filesize
89KB
MD5855fd077fcb734b82f3e3a9c519127ae
SHA117ebfe3d986f8c5deb57f7abdddd1e3f8b719f55
SHA2566500c8461a03fcfa381883a12cb551ba3163b16e9908c2ca47534aec7cb13ec0
SHA512d8f6502f1708739c660235cdadf03004dfc22bc225eb4e7611380f92aa1ab3eec6a569a2ed9a04d2652b6eb7bdd56e5a8d9dcbece0ed368ae95545a70a313e96
-
Filesize
89KB
MD59648a485f23b10ad9d6ff516d5f61dab
SHA1c4bae5aefd4db2cbb286c8e2b0e124fb04a9b204
SHA2560d9c9414a9fc409f6067d663eb88b7662dace6dd128a5f5fb37d1b7a03277c6b
SHA512b8ad29fd6d6c33f55415c45ca7c49d3ab7e5bf6d33db58b4344521bbaac109a06a30a9d362343c9a30c8291952cec4595cb0a3d85de8b8dfed03972f0ce1bf52
-
Filesize
89KB
MD56dc0ef199eac44d279b45621263fbadb
SHA1e0a9aef8bcf4644802b08bc3c66e25f4ad9e13bd
SHA25675556dfb319b0bde538ad123ddbaa5280b22494faca09f3335ab7a60683905ce
SHA51263c3e040b1f47ef8247b6cf1aa468becf75efceef9aa7bbef436af51877f317b67ff5856f506ba0c292842e992df1930c026c1001afff64565a706a2565c74af
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd