Analysis
-
max time kernel
21s -
max time network
19s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
16/08/2023, 14:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kinrossam.com
Resource
win10-20230703-en
General
-
Target
http://kinrossam.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366693773909009" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2116 chrome.exe 2116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe Token: SeShutdownPrivilege 2116 chrome.exe Token: SeCreatePagefilePrivilege 2116 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe 2116 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4212 2116 chrome.exe 45 PID 2116 wrote to memory of 4212 2116 chrome.exe 45 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 4616 2116 chrome.exe 75 PID 2116 wrote to memory of 3320 2116 chrome.exe 71 PID 2116 wrote to memory of 3320 2116 chrome.exe 71 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72 PID 2116 wrote to memory of 3156 2116 chrome.exe 72
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kinrossam.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff0b489758,0x7fff0b489768,0x7fff0b4897782⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1928 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2724 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:22⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3812 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2864 --field-trial-handle=1864,i,14031217456994358843,15544163816476030061,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3352
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD56c4aa073ba23b74a61d7a70749e2e593
SHA12284eef011e05f3bc141cf9cb6e5eb0fd433313a
SHA2567a370aa88fcdb65d89ba4cdc33d7fa09ab52eba8cf2069bba667501f1f754bc9
SHA5127109fb808378b77bdfe1a405c85b0f0726b1ff4ca6359b336253ba2afcb51890b9d365aadfa4bf8a8f9817ce050bdcd1ef7b70b0ecc7bf229dabc50420f2e695
-
Filesize
87KB
MD5b5985fd4c20a16815207c559c498c69f
SHA11f1ce3a9ff4407bb6565ec4e89c4cee8cf37c90c
SHA256cb4e725e5c089e395ba0c024e3e858652ba35f3e1b6f77fe80e3387f1398f2f2
SHA512aa5e3a5ec4bc4173f5dfb9d65fd32206fcbaf57e708f421304807938a77535ee68f9fe08e38b8bbf4215935d3b1db446f6ed5c0682d413864e0317b7dbe83372
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd