Analysis
-
max time kernel
600s -
max time network
599s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
07-08-2023 07:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fra2.hostclusters.com/%7Ewmalprazo/TRC
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
https://fra2.hostclusters.com/%7Ewmalprazo/TRC
Resource
android-x64-20230621-en
General
-
Target
https://fra2.hostclusters.com/%7Ewmalprazo/TRC
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133358672303880417" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2124 4868 chrome.exe 70 PID 4868 wrote to memory of 2124 4868 chrome.exe 70 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 856 4868 chrome.exe 73 PID 4868 wrote to memory of 628 4868 chrome.exe 72 PID 4868 wrote to memory of 628 4868 chrome.exe 72 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74 PID 4868 wrote to memory of 1212 4868 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://fra2.hostclusters.com/%7Ewmalprazo/TRC1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff17409758,0x7fff17409768,0x7fff174097782⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:22⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:82⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3744 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:12⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3084 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3212 --field-trial-handle=1884,i,11214071068898926222,9981984757250529922,131072 /prefetch:12⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3724
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744B
MD5afbc2b45e4f04048d6fbb4bf76133c90
SHA1df847112766a0cf36a124ce10f5382cc1ca57970
SHA256a5631842f1057d1dffced3e9c82f420444c9ff35c895ae804f393f8e108ca91e
SHA512d4c324e15b7bb6278eabe8cdce8d2425d18f1af8d69f5cb2e19a3d0b59ef5297da1d4d24816272c58e9eeb559019d44e1e66402fa6d62e02deacf8fd87930c24
-
Filesize
1KB
MD5360dcbf1210342bd3e391e9e44d4980d
SHA1b2d803b761b8aa60253648f00b2868a5473f587b
SHA2566aa35f2c9d84f93a6674e2100005a933be5c981e349e86e2bddeaae87c6826c6
SHA5121e863ca4d5ae88f6bd664f9cbc77bb77d057db02d3956cf23eec7c36e925875d5a934687ead58da6075becec169d30339a30689015cbd32585dadddffd3cfa57
-
Filesize
1KB
MD51bdd701b1a83b72011b760bf4bda5806
SHA1c0939602b924a2d5f615933e5578296be3d53f07
SHA256b9210e7cdd5a37064f62965d656c23360eea400abb002af28d9fb32d8cf99af4
SHA512ee42b9ee2a82009ff441e5cd671356020eff62a65883dff1650ac83b5b1eca506934bd91976f29cf50df71e1d56378ab9e4e3b817b0a7bcd1cc4fd07d4788dc1
-
Filesize
538B
MD517b910f1533676fe6dc2ee9a6609340a
SHA1c4beb70304ddccf048e50bd496b2429d1f57bfae
SHA25644dcc72901e513742d2974e52dbc27c0572a88c2c99172d2c471bb29adaed294
SHA512496a1f08d0ff49b808f97db50416b5b9833370742040fff9762fe911af931d092b667128905a59e35f924ca747855ae3de6104c22d1628c73c97ec31f804ff78
-
Filesize
6KB
MD5e9eace4abc08db2ee30a02ee62e7e532
SHA1ba4a3bb0af6e55ae9d78f8695e7cab541303333f
SHA256030c57b2629fee2f8a632d72a962c80abd62e523a41129294d28f0a4fdc2646c
SHA512aa08d0f0f6de29da83b7b380f67a85038df6b630dd28e30e4f78189804b7efb6a7b015c1c8de325c895008f18deeefe506bfcdd34f5eaa9bb2d6c92ffb7f93e3
-
Filesize
6KB
MD59c7307a44bed326295de9b48c4b0dc98
SHA19e2bf2eb6b8c8e335cbfeccb97e096e0c046dd3c
SHA2567d4ede8bb740a3479ef44c91a17f2d6ff2ec327df0b767b9d9ba5f24d78471ed
SHA5125933452365fff6756c63b68f926a780f3b663d6c7ad84e161d98557da97f988c56096c2d65a110c23f2b871a02f43ecf50e64c29017d4d8eead16881e9c1ff22
-
Filesize
6KB
MD51ea23b58c8f833481600b04595e1f9b8
SHA144f887af7c47c1ba38f06e88bbaa0d27e74103ec
SHA25680007778baeb28b0457c1c942fe82dfae5fa5548b10c1282ca565ddee97834d7
SHA51234915ad9b673bf0f0abe293a74bd186e0e4d7a1faedb1606d52f484acf880f5684a6b4dfa8e51df32761d01151755ab7b0af2ff2a8f596b629727e924328423d
-
Filesize
6KB
MD564ed9538facf9c413499719586223692
SHA18369c9f47a86ceb4c65806987d12b15e7bdd6a16
SHA25679f1aaae6d6447dc994bc6bae9c15cc3882656b743d6f33d512f0fbb17dd0e14
SHA51266dd5324c1a66ab41ace31baf087d87d7e0467b7d0f54a4e63d1f58bc3672624cffd5f6a58a42bef64d2b02d8a0df107b143eb8f26a75d4187ae81158f44b502
-
Filesize
87KB
MD55bcb88f197d7c78f2f81bba4a7a5afdd
SHA124f65294837ee07d87ecb7e3adb9e48555be8a00
SHA256464af5652dda8be84cbd060c86faf6e3c52e74e44906491f01da58de7a09306c
SHA512a85f08880665653180a6d43e09ef1614d02a2619cc63fea739fcca5192089ff47f14d53586f72d71a006648d4affff1ce5262ef79b81e5916626dbeab67f3c4b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd