Analysis
-
max time kernel
45s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
24/07/2023, 08:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gpt4all.io
Resource
win10-20230703-en
General
-
Target
http://gpt4all.io
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133346618899844165" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 1936 4524 chrome.exe 70 PID 4524 wrote to memory of 1936 4524 chrome.exe 70 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 4492 4524 chrome.exe 73 PID 4524 wrote to memory of 5092 4524 chrome.exe 72 PID 4524 wrote to memory of 5092 4524 chrome.exe 72 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74 PID 4524 wrote to memory of 4164 4524 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://gpt4all.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb0c809758,0x7ffb0c809768,0x7ffb0c8097782⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:22⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2664 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2644 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4332 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3500 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 --field-trial-handle=1732,i,16898409795667619479,14258738440612482727,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864B
MD522427c93f0978a654e55612b4335d6f9
SHA15bd651e7fc998b755b82ddafa858d2a25aee65dc
SHA256075d75c99671f0b6368a943f3f40e39c8f8b0b2160f84b5148fd4e2c9854afa8
SHA5121cb1bdaf28d245d2a59a1f67939842dd71aae84351d380ba136d0627e5d88851d8239387d0bdd111bf134f1eaa8165c018062b308d3ac485afadcd1f8fbaf1ef
-
Filesize
1KB
MD5c3b15a208cb619edf785e1a7f375d2eb
SHA1b1c54980db96ab3b042899c904a0b629e1d0e294
SHA25604a8a1d29e398b584e30501db46ed375c1f0dce5941b6c445952486771a87c73
SHA512c3c9a86a8e244d070a67f124fbf18ad8c7e0f5880fcd9b8a5f7b73739e8c0d286d89c5fb930af82e386f32a4645e4505c07e2ae876dc28e050abdc78b48b46b1
-
Filesize
1KB
MD51dd63de8067fd665d0eb06833d6e51cb
SHA169908171312c75861639497e41a3d10771cae7d4
SHA2561e5e17ae3bcd9f9d075b970ca677773d784f36e8edf492f7942ebcf934d19c29
SHA5120337270b7c389c512f1486963fe5444da7413f88f91fb70170736a1cef6650e27e62af26a9e3f3407f156a71d16091a6b87cdefa601c0e4755dae0765bfb151d
-
Filesize
5KB
MD59aecf50524aef68ccf5591ad4db3361b
SHA1512220b2aab1d374520bd136673a3af507e768a3
SHA2567fa3163d5fb3495af2f0ba42bea9746273fd5d3d8fd1460b8a4dfd709ae9c9ba
SHA512b292c86733d2b175e2d561c1b93315f13e566b3e481bbdfcacc6835834db4f0f3c7a4e5ad7bb95cfceed8e1e819014f7d8654a7316dc384f2b0d61fb59da82ed
-
Filesize
5KB
MD5366f55780f38db971bb0e846cf68a30a
SHA1cd9cb1b2bb4d59215aabc33715bed8168080015b
SHA256de49e87188e25ce01e76267ba12522459be781bda602e53382c836a739792117
SHA51285ce59fe436ac9b6b3a833063021338744edd2c54b25f348a9c450c47f4fd32a732194ffbe5ffe4ae60e812c98f2d1bae71524a902ae39009e20bda4bfa1b022
-
Filesize
87KB
MD5f27c417b38306f9991bc2d499fb1a96f
SHA153dd1afeb6179e3a8ce92245001aabbaca78b08e
SHA2568f7c7eb4662edab5ab7464fa4c88bbdddf98d4f3735f03c1c5d6d373c1b9f19d
SHA512464aa66bd3e1a2f3682ec4fcf016cdfed06a9a389d018dda8d3b4d1c5898cc1fd1a51b4c8e4622c3f6be87f585b2d956894172463d4922f1b0c72447eade39a7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd