Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
07/08/2023, 09:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://2l.wehoo.cc/34546de4235m342356?affsub2=ZPhXLf&st=8/7/2023%201:52:11%20AM
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
http://2l.wehoo.cc/34546de4235m342356?affsub2=ZPhXLf&st=8/7/2023%201:52:11%20AM
Resource
win10v2004-20230703-en
General
-
Target
http://2l.wehoo.cc/34546de4235m342356?affsub2=ZPhXLf&st=8/7/2023%201:52:11%20AM
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133358742087044646" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 3588 chrome.exe 3588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4340 wrote to memory of 1264 4340 chrome.exe 70 PID 4340 wrote to memory of 1264 4340 chrome.exe 70 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3116 4340 chrome.exe 73 PID 4340 wrote to memory of 3368 4340 chrome.exe 72 PID 4340 wrote to memory of 3368 4340 chrome.exe 72 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74 PID 4340 wrote to memory of 4672 4340 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://2l.wehoo.cc/34546de4235m342356?affsub2=ZPhXLf&st=8/7/2023%201:52:11%20AM1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdc6189758,0x7ffdc6189768,0x7ffdc61897782⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:22⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2628 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2620 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 --field-trial-handle=1768,i,9793637793849175129,8786164117238963276,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:224
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701B
MD539eac6e222813d076999fef6157e108a
SHA134c1aa8566fb28a87f63a080603f09f073df6d42
SHA2565ceaf0c120ad295756c43109658c7a211385b12b19220fcf5147d9feb49c71af
SHA51244177db004bec04105985d72f028264cf730362f8ea16f510042e2361c5d2fd77f3c3e4566f237de94810322205c77537c6d601f4533a6382687ae374245fd4e
-
Filesize
539B
MD5580bd414b59986cdca2bbf80e7a76e3f
SHA168e2d531950481470e0633c49ddc8abd38dd46b5
SHA256abd658053b338348feb2106ee4911d067ed93a015b24ad91f90447457c4b12df
SHA512f0d6beef2a0494e07acb15150162de7c24ed95d98d592902aaff71fe758423adc0cb9c73826d2602b3681421c36ab6bf7ad3f4b24804dbbbf44ddeccd799f3f2
-
Filesize
6KB
MD5cc5d30ae650841c4bff07c41d3f7f954
SHA15fd841209c955e75b4045e7831d74b2f9d95c4d8
SHA256ec46843453fbb594a169a3e39cf87ff437f90dc4d04af382aece47d80c168d01
SHA512cefe4e7b87c66f9cbadcc72d4af334cf5111a018a566cb17afba65c22188e8a507be38ba0fa75a3f6349f23c6eb8732285f510b189b3337c2ca588aef7a83a81
-
Filesize
6KB
MD517af3502ed2c4fb97a67ff14297ffc71
SHA10d764190174a5ff22144c34438e1965414f00ce2
SHA2564923c1516584098d5ea6090474905f08cbe52723bb9212032eb67534699ba3df
SHA51242c8b843719ae3ef155e04bc7979b43ee721d717c5aa9ccdd5f950a0b912f2ebe0ed9103bbb233107158aebbba5c554e889d28786c2b13c4fb1b915a279ba97f
-
Filesize
6KB
MD59678cc1883a9b9ceb3f498914d9fc239
SHA17638b85b599518ca2680109f41d73f8c2ecc54cc
SHA2566bc5b2b3cc061bc7ac399e124766d2b59ebb68b62b906b0d67687df26e784c3c
SHA5125edd6440454c0e528ab0236da29896bb151f92fe26278f902baecc664cd2ad840be3d7ed1881c7e587b96b3f60c61a5ae5bec08d37634b15040753e5b90ac5f1
-
Filesize
87KB
MD5cea98dda258bbe0b00420980e6598f06
SHA1f32f1b3f60d16a016d09e16b0d10c2dabde991d5
SHA256490d64d9180d51353a497724fab4d220dcc0273cc8d67cb6ec284c9e72ec25fb
SHA512424d9bca7420dab59986ab3af6ddda5a5fd3cac9f80a8f1b4ab083a506423302c375c528a165f45f3f2d369f1ff095753eca7849a900415784e1527076b0531b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd