Analysis
-
max time kernel
107s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 16:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://213.138.100.98:8080/teapot/
Resource
win10v2004-20230703-en
General
-
Target
http://213.138.100.98:8080/teapot/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342578721078910" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1244 2708 chrome.exe 65 PID 2708 wrote to memory of 1244 2708 chrome.exe 65 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 2004 2708 chrome.exe 88 PID 2708 wrote to memory of 1412 2708 chrome.exe 89 PID 2708 wrote to memory of 1412 2708 chrome.exe 89 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90 PID 2708 wrote to memory of 1540 2708 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://213.138.100.98:8080/teapot/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb631e9758,0x7ffb631e9768,0x7ffb631e97782⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:22⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:82⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5940 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=6124 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5948 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3124 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3768 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=984 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=744 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3772 --field-trial-handle=1840,i,17989166949731275173,8236986375285624966,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5684d29697dd56ead5e1658e8ece079b6
SHA14af8070d274b40fa55c3df5319d642f6f7b83b6f
SHA256ac0446d7e78ae26873ffda4b3e224b752e96430942de892d9a04aa96532c3d96
SHA51287f6c6e306659bb904c1282bf920968f8c2d0383531b58b3a655a3dbf57599ed60b5a973d1f84b79bd5dd2bd800e948f474f3536cc2ed4e5de80e892a56fe9f4
-
Filesize
6KB
MD53988f55e8239ba2effa5d31ab399a378
SHA15ea2bcb5c6fb1c48256a0642d9be800bdda74fc8
SHA2564a591ddb9588ba0d342cea5c3f333b7a4f477eb29813fe3a73b130a40f5801b6
SHA512d06ce32edde17effcb601d447219153ccc2b1f9976d9e795c642eb38286cb148d157dcca05681502b713ea92547f3d6d5b685b4c14d246b93713e5decd404cdb
-
Filesize
6KB
MD59eaecae6935658d759550a6c1cdf2a9a
SHA1c3f6544dc1786c5e91f3a35f576e4219e154a79e
SHA256862191a0a92e90b93680a4c5de226e5daf92975993150b5f1ef62c0143caaeeb
SHA51230845437728ed8de97b59e069c837898f8bedde5431d9f88199a72914ae147a8b758c0f5837fe719d083d8ab8e5ee5b29496615cfae0a1aa7d8592c11cb0c8d8
-
Filesize
87KB
MD58798e6a61ea1e6ee647fd9ab97dcb673
SHA1508923a4090447d1a362abafe3bbf1a41c351474
SHA25623ef715efc1fd753c69f3a43a1094b1389d176af4b97d87b3f84f526de0625fd
SHA51299ce725d756ac2031a522884e58ba0d541f628468a41d6422ce32f0b033b1a10a33449513d8ab4d620d6942a016f891e50a8926c98132b461a4e7f5ce3dbda04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd