Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 16:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://30.30.86.3:8080/
Resource
win10v2004-20230703-en
General
-
Target
http://30.30.86.3:8080/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133358997480203999" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1188 chrome.exe 1188 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe Token: SeShutdownPrivilege 1188 chrome.exe Token: SeCreatePagefilePrivilege 1188 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4072 1188 chrome.exe 81 PID 1188 wrote to memory of 4072 1188 chrome.exe 81 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 5044 1188 chrome.exe 83 PID 1188 wrote to memory of 3460 1188 chrome.exe 84 PID 1188 wrote to memory of 3460 1188 chrome.exe 84 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85 PID 1188 wrote to memory of 4308 1188 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://30.30.86.3:8080/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff911cc9758,0x7ff911cc9768,0x7ff911cc97782⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:22⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4268 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5116 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3412 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3784 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3140 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 --field-trial-handle=1856,i,9326153221455680223,10143913371327929327,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD518cba19e018c734d83e0c6566f2f5b9c
SHA1347ff0eefcdf957e1e27f2566114624cb6fc41c2
SHA256b4e245a09120abc3f44dae07a8e25a03ddaaaa188efc38a2b89ea7c890c282da
SHA5129e7f4ad7ffa708cfa1773bb92846e26f71384f15f0a21f826ad7017d5ab15c68a10abd9b718af64f328cd74fad0bca8fbeac7e25e1ff99be7630ee9c4c3c852b
-
Filesize
5KB
MD5e28b5a26b2db215ad54a4098dd882a97
SHA16b6da3118bd050bc8e343cefffa3ad4747a8aa6a
SHA2565cff81e07cc4c106914ebeb484111815bac1235a50b6490be220e39acddfb946
SHA512799e6cbbd5486249b4739a891599280f74055ca1bbe684ee68b1de8f4acc88df74f57a1f27c6b6c33e5fae343943f7f54c1e36a75bf36d51640f2ffb2a6834d2
-
Filesize
5KB
MD56ef0f311abe51a2f2275d5af72d6f0d4
SHA17d0fbdb500537faf454cc8cca01ca69d803fc39e
SHA256aea204a07c3f9a1613aac6fb17509e799ac56a82f725c6e4146afdb8d77d8a28
SHA512ecd47fc7898696cc44c46d5a0901008ba742cf255f35b6d792166083b69ce3f1fb1dde2351251b3e1762eef9e4c25fade571030e747f51883ad2cccd539d84d8
-
Filesize
87KB
MD5b7f11d2c77beed4a9bbe08407c82034f
SHA1ff7bf9a1535ef5ca557bd5f73c597e30174e0a2f
SHA256ce98efc024f7ad25466e7900969ba5b05b701f3a0df27302234b9ee6ec49de19
SHA51261e362b0622144bf06a41f0d871739e506f3a90549a7c33c13765e6b908cd8eaee4d8792509db34cba6b06e503b812309434867ea55a34483220fba4a96936c2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd