Analysis
-
max time kernel
300s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 14:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bhtyqsnmruutkxglxrbo.com
Resource
win10v2004-20230703-en
General
-
Target
http://bhtyqsnmruutkxglxrbo.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343385342977662" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1808 1528 chrome.exe 84 PID 1528 wrote to memory of 1808 1528 chrome.exe 84 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 4436 1528 chrome.exe 87 PID 1528 wrote to memory of 1980 1528 chrome.exe 88 PID 1528 wrote to memory of 1980 1528 chrome.exe 88 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89 PID 1528 wrote to memory of 1264 1528 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bhtyqsnmruutkxglxrbo.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc6be99758,0x7ffc6be99768,0x7ffc6be997782⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:22⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1708 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2128 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1756 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3764 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2484 --field-trial-handle=1820,i,4123296619546305369,212517901339003602,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e7f82724f63e73844fbc5d3f7add3b03
SHA1bbdeed0597e04247e352960dd51c7414d1532734
SHA2568e2cc4dcee05133745b8d87a283724a03339af16ec121401658a6a55b6b7b2f3
SHA5121a85b600adb853c6c2ad9781edc86ff5229dcc57dc44d6d29e7db7d187d7926d7e9452b913492ad3929f525fc32922382c917630baeaf6491d49c272dfbacf49
-
Filesize
6KB
MD52fb3fb8084337828ee62616068a00481
SHA1d0bea09430c2b686193317e4f1d47ce2be105579
SHA256a95764744646810f9d8b09cd768a0bd1b1afa4d323911b3ee13f80c98fa510b5
SHA5120aa3022a698e3868ea229a3af88f03feb1cbb7aec5ddb7c73168f7b62072a5652a07a76a416d4fd6c99b4aff8d18b98274b71f9285de2be87d1b3ed675550735
-
Filesize
5KB
MD51dd86978d222ca19cbcbc70d15636cfa
SHA15e183404672ebf498581da332595aaf784df930a
SHA25694e3e16e62172c21d771806d26b7a52cf47678e3c46424ab41599b95a632be97
SHA512b5d40759b76c52b0cb4fedeeb23f74dbf204628dab95026e203daf0f6d5510ce0af3b5976efa3ee43d858e05dd7eebb3c72a068c2b37d5f9452a2ede76d9496a
-
Filesize
87KB
MD5df3fe7acc52c8bdcbb13afd54767dea7
SHA15bb64c0701495fca692b0fad2c1881629757adca
SHA256cc5d6047d5109dc03660e11d56dd2604e6151e36ca3f30feb40b1d3e55b11fd4
SHA5129bff5ab650e9291c172b9864ce3c8e0b38b97062b3b439b57b8734eac972e13e9602c419741c5ac5e1b4b61382152d38d70f439586a2ba81b19a75cb39421469
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd