Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 16:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hub.dsjglobal.com/e3t/Ctc/GF+113/d2jks704/VVtkgd3-0tD-N2mGV5GH9y-MW2VV8NG52B_gRN861KB43qgyTW7Y8-PT6lZ3kRW6wJK5N4FYB8wW4c8Ldt5C-Bs6W5ssGqS6r-Kl9VcFwxH8-DGjJW8hmK3N36R4B6W3y6Lc84Bm_SCW9lHCfP4qlV9HW7B59hP77b72BW3tkFcB4y3DkbW79Gwjh29QwxCW8dqK-K8Ck0bXW7PGmMY39TDT-W370rY3168_0xW6cJCr11tZCLRW2SsyZQ26CZCwW97B6sB1Jhd5lW3-F_V78zF57sW7WWCqL5tnrCPN3fTyfVmrcb0W2BRW289f3ZC3W6-wDDK6-KFh7W3Y5yBN7X-NT4M6YMf4DSDLQW6ZtKw03X5G9FW64SbC11K0sxSW1Hv9V44BzD-wf78FtPj04
Resource
win10v2004-20230703-en
General
-
Target
https://hub.dsjglobal.com/e3t/Ctc/GF+113/d2jks704/VVtkgd3-0tD-N2mGV5GH9y-MW2VV8NG52B_gRN861KB43qgyTW7Y8-PT6lZ3kRW6wJK5N4FYB8wW4c8Ldt5C-Bs6W5ssGqS6r-Kl9VcFwxH8-DGjJW8hmK3N36R4B6W3y6Lc84Bm_SCW9lHCfP4qlV9HW7B59hP77b72BW3tkFcB4y3DkbW79Gwjh29QwxCW8dqK-K8Ck0bXW7PGmMY39TDT-W370rY3168_0xW6cJCr11tZCLRW2SsyZQ26CZCwW97B6sB1Jhd5lW3-F_V78zF57sW7WWCqL5tnrCPN3fTyfVmrcb0W2BRW289f3ZC3W6-wDDK6-KFh7W3Y5yBN7X-NT4M6YMf4DSDLQW6ZtKw03X5G9FW64SbC11K0sxSW1Hv9V44BzD-wf78FtPj04
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133373700119748679" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe 3344 chrome.exe 3344 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1544 4328 chrome.exe 81 PID 4328 wrote to memory of 1544 4328 chrome.exe 81 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 5064 4328 chrome.exe 83 PID 4328 wrote to memory of 2960 4328 chrome.exe 85 PID 4328 wrote to memory of 2960 4328 chrome.exe 85 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84 PID 4328 wrote to memory of 3836 4328 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hub.dsjglobal.com/e3t/Ctc/GF+113/d2jks704/VVtkgd3-0tD-N2mGV5GH9y-MW2VV8NG52B_gRN861KB43qgyTW7Y8-PT6lZ3kRW6wJK5N4FYB8wW4c8Ldt5C-Bs6W5ssGqS6r-Kl9VcFwxH8-DGjJW8hmK3N36R4B6W3y6Lc84Bm_SCW9lHCfP4qlV9HW7B59hP77b72BW3tkFcB4y3DkbW79Gwjh29QwxCW8dqK-K8Ck0bXW7PGmMY39TDT-W370rY3168_0xW6cJCr11tZCLRW2SsyZQ26CZCwW97B6sB1Jhd5lW3-F_V78zF57sW7WWCqL5tnrCPN3fTyfVmrcb0W2BRW289f3ZC3W6-wDDK6-KFh7W3Y5yBN7X-NT4M6YMf4DSDLQW6ZtKw03X5G9FW64SbC11K0sxSW1Hv9V44BzD-wf78FtPj041⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3af69758,0x7fff3af69768,0x7fff3af697782⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:22⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:12⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 --field-trial-handle=1888,i,15725362835246208,5630738859811087411,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1792
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD5da0410a2a6f8a19e3f14fc708998493a
SHA151fc58c39a27ec421f7ef4df5c4f33b2586ff422
SHA256493e576f58ab5107a4a56bf67a088625ab9d49450ff11a5d56b664d89db41f71
SHA512dac6906bb1e4077138d9881fc504b639bb367151cbb8929fdd97d4a85488593195a6546d2aca9e9f2b0b4c03519a905ade40f7fe78da0fe81d0ecda0c40d6070
-
Filesize
5KB
MD5414c423de095cb0bb56da402869a74ea
SHA1406a4c207ed1348076775393a6dc70040ef675c1
SHA256cfbcfee9c07827f14891d2391cfdf9bc6460468274a926a234c96f0651c22a14
SHA5126d45c360b77e4e2efaf04cec15a64cbd5c95b7c356b60aae7a4651bf5f0964cf1343bf2cf14eb63723d16d485f4172ed20b2a132290b2ca42454be633308f3f1
-
Filesize
3KB
MD5d232cbe769348679de23725b508fc272
SHA1920d399e9cecbac390092f28c10e0b4bc708f87f
SHA256c84a80d2a3cd47dacc00b3c6de9f8a29406a224e82a30a82f66c07be4154fec1
SHA51259f1a889a40b15d09fc817dc5049e37ad60a80b733930a8739ec4e8595b9c74f6036c7479f4cbd8007c2937c0218966abee2f3f33c7600d327f971eb426f4e99
-
Filesize
6KB
MD57d45378a3d7fd5e6b5757243dcfca544
SHA183a466d2dad8a3454268906f8b33024508a5be5c
SHA256003c7cac988b7d9aa43191940ff7e18a7bdb6ff7b1bd59e5d5fc583b4ce99f55
SHA512af7d75aaa6b3098bc4e66b184ee64303339f42612cccf08506066f85c762b3762d619c076d3e2a3a21ca7647eac754cd5e3bee347615c16b6fd07c12befb45eb
-
Filesize
87KB
MD50c27468bcdb5fe40b9766db33f7227ce
SHA1479244031034ae50e5ac54ce13d9c7c4c4ac74c4
SHA256c000af6ba320cce964e9485d4b1d6a22d97bd126c41194b8789e95066dda56df
SHA51256e5f33c92df0645e6ee605c63c32a17343bab524aa405256c40e733cf75f14014dad77442a408ef20e231c9924dce88b476843f8d30424071452050480b0756
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd