Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 06:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://nowplaying.radiozenders.fm
Resource
win10v2004-20230703-en
General
-
Target
http://nowplaying.radiozenders.fm
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133368153795463182" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3168 1508 chrome.exe 82 PID 1508 wrote to memory of 3168 1508 chrome.exe 82 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 2504 1508 chrome.exe 84 PID 1508 wrote to memory of 3936 1508 chrome.exe 85 PID 1508 wrote to memory of 3936 1508 chrome.exe 85 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86 PID 1508 wrote to memory of 2020 1508 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://nowplaying.radiozenders.fm1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcffec9758,0x7ffcffec9768,0x7ffcffec97782⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:22⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3700 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2892 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3224 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3868 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1740 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3740 --field-trial-handle=1960,i,6449283777593041541,16891647677002250712,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3236
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a22baa6e8ce7b4e8b6da628600ad41fd
SHA1d6022516562dcf38994166a64444526a84f850e3
SHA256921e2a289cf09c8daf3dd27d23acb14f3bca17b951339c992cca562fb2b7f81e
SHA512165dc0c8ddb92e15b3777dbbf2f2dae3eab6d50a3644589092c7f3d9f6fb7c9c900f18e77c7185a9ae3975d40f0ecd04c06baf71fc0cf3ace252ec4b473fca10
-
Filesize
5KB
MD5bf124ff21ebfb495d97bcb4c7a0754f5
SHA1e2f6691ab70db0439124e595374f8cac882a07e7
SHA256156d7f4aa375238e2623e0641aca2eb8f177d78bb8a3d2b046ad5f025be1b4e9
SHA51262469d4469c37c42eb586d0bb077feb36a9b063147af3766e923dd53bdbe6adf05d2372061117c367c59ac5e24b6ab4f5ba33a179736f8cf11b8cc76db26019b
-
Filesize
5KB
MD507605cbe2597a3b7fe8a9a716c48ef70
SHA1795422afad3b442ebc5e4adae5d9c399bbb6cb77
SHA2569d2533a40554b169a76d694767c2c7a123a29a6dd1d603e834ed97bc3f05868f
SHA5127bc1dc7fb72d82505af573ac524baa954b01039f0b2970ec61d579b1adc7eae7c7a71b6d6f3dc954be1463bf06af3c316db734ef1c629ceefe38c18b5d09b766
-
Filesize
87KB
MD538d231dcf7527aa956a511a735e0a8c4
SHA1d628500bf793710eaa0a1b3b8712f0f79d78ac2b
SHA256a452a209e49efdb6cf5afef812492ac2f933e14303a0cc6c71f70fccef5a9fe1
SHA512580c71f20ba83eea13784d2f2d33008fd638acb4dd642761c39daeb823b1f9496c70393b15dbed091eb5eab71ed94efc0f9e4d288723388fba2a1c59d4fed0c6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd