Analysis
-
max time kernel
300s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 19:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.haikudeck.com/p/311024bf07
Resource
win10v2004-20230703-en
General
-
Target
https://www.haikudeck.com/p/311024bf07
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366029277827704" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 236 chrome.exe 236 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4660 2520 chrome.exe 81 PID 2520 wrote to memory of 4660 2520 chrome.exe 81 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 1308 2520 chrome.exe 83 PID 2520 wrote to memory of 384 2520 chrome.exe 87 PID 2520 wrote to memory of 384 2520 chrome.exe 87 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84 PID 2520 wrote to memory of 4616 2520 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.haikudeck.com/p/311024bf071⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1d429758,0x7ffd1d429768,0x7ffd1d4297782⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:22⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:82⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4912 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4908 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5188 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3220 --field-trial-handle=1880,i,10212421363737261319,18277903987601411785,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:236
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD55c6fccb291bbb185a6749ea7935b6b63
SHA14cdc90e20f016fef9098605c420912dbfa652520
SHA2563568e583cd1e3490ab68420bd9b0e777ccf30ab40cdd637fe800ad7d96584d60
SHA512100a48fdc617e01de0a26a311735d5855ddeac1dc16770c3350726e8262c5bbf23a7663b8979899d2e508cd56f24331f2695eb0d6fa4bee7608298792c5b6e43
-
Filesize
1KB
MD5fb0f7fdfc66e762ee4225e7d40cc901d
SHA19beba1d72456967ce08b1bb806a2103f8fb018c5
SHA25657b55c221fa7373d0d3f0ba82af14eb88e3be0e862b3a6b898da1f20489cbe58
SHA512ab116faec09c97ae68b8dbfd3600c1613951364b021970f0ae0552c3ea4e7b8036dffcd683edb628d3fb56a16c7b111929db3fae61e64d26aa144316bf2574b7
-
Filesize
1KB
MD51acd92fb46e622cf2e0b9839ecdddcce
SHA175880c413c0986a90034ac9b1fca339b4403ea2e
SHA256732b78ccddafdf0ff976244ccd9a167aee9d6afddb26188106850c12e5164733
SHA512dec3c6bcbf0889946e8ea4d071ff411f9904f15f6475b70bf4ca93e5806adaca7eef7b71af2d26a902da1440dbadafb368157bf9f1b5255648e3e6cfc7042366
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\fec39294-1409-4bd3-ba4d-dcbeac2c9170.tmp
Filesize3KB
MD5828edcb0e4dcf222a42d90823c8ac2c0
SHA16d8ba4cccabb5aed483684075fd4c76af9b4329a
SHA256a0ea5923a6daeaed7009ba72576dd1d0e4cdf063c62321586406e2fb7605081f
SHA51225fd26af616ca8e9db656d2553ebfb59bb586681362d939457b2b3fa6411f6f696f6a705037a28cb4127fcccdece17c752da7b81b0bac654de7f86c4d6823ad5
-
Filesize
6KB
MD55c91574390c9363a3f5e0a78b34f3819
SHA16901caab1c9dbc8821cbde635d0ff258a0d1dcab
SHA256e11279afb45f90c239ea5e8ecab909b7a092fe3b7f847b912a98bdfa222111c3
SHA512b9e86e8d52c35a461a9cdbdff4a5f3e06137af19e1269f0bccff3fde512c677745fcc539a86675c7fb2daf497e966c0c242858a410ed7604143d852e8c940775
-
Filesize
87KB
MD5391cf101018de07232cbdf11327fcb45
SHA17828c1f8c89c1b411b15d28282bb4ae09ae0be0c
SHA2562fd6cae7bd76e67a32bcda97ffcc2f6de4b8d54889a05128ae11fe78752afef2
SHA5124f814bfe990b21f6dbd6eff5cae28063840ad8c7bffa86c1e5c3dd0802315a57fd939af7387ccf4f84ac5428db9be1930982e1d91f31439029e1529358c50158
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd