Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 17:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cjldj3qo2mln2epj38t061u5sca59dha4.oast.fun/minio/webrpc
Resource
win10v2004-20230703-en
General
-
Target
http://cjldj3qo2mln2epj38t061u5sca59dha4.oast.fun/minio/webrpc
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133377165609487822" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe Token: SeShutdownPrivilege 4404 chrome.exe Token: SeCreatePagefilePrivilege 4404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4392 4404 chrome.exe 81 PID 4404 wrote to memory of 4392 4404 chrome.exe 81 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 2300 4404 chrome.exe 83 PID 4404 wrote to memory of 3988 4404 chrome.exe 84 PID 4404 wrote to memory of 3988 4404 chrome.exe 84 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85 PID 4404 wrote to memory of 4192 4404 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://cjldj3qo2mln2epj38t061u5sca59dha4.oast.fun/minio/webrpc1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb8fc9758,0x7ffdb8fc9768,0x7ffdb8fc97782⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:22⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:82⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 --field-trial-handle=1868,i,15621434639610482995,5416639620369717208,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5000
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5cd33563b717ed616e12e469cc8700d60
SHA16f73f5c69085676f4e586daf7464fdee4f401b3b
SHA25605e570d861f347a5060a47e1a0693bd1671f3b0b0c55d0ee559d7a857ecdf408
SHA51261b1a3a6977a2c1f668ff83362f138cad933b690f2a9255440337f612a0ee68ed0382db0dcb129935eed06eba409acf56377207b85ced7fb0cdd0cb8bd00f905
-
Filesize
6KB
MD5ef40e04755e96316695d70d4496a1da6
SHA198f3e6fa9ad178d005242a097fec776ac9aa8077
SHA2566508f199921f6dfa67c57c4bd5828e75db611e2b496ad56c0fda46ee646b0bae
SHA512384dea6aa4e1e30c265cc2583f15630f4dace74b37bd68a34a84acc08a55dc8ccfd0a8f5715bcc245e5c6916cc1f8262ce75676ece8bf90e0e7d86414a4f4828
-
Filesize
87KB
MD5521f0f3ebe1f217fa9aa6468becbe53f
SHA102133590886030a56514c457a3397c1b02cc2793
SHA256911f1262e95767ba745487d33c437ea2aa3190e6f36cb9875637e680b38ddf1c
SHA5127a3f5dbedcb4aafc7bdfed9e1b4354581bd063e5df4c50a689022bc8e6bec746cf495bf6962def9e236a399e56777737132c838312988b89f8e7ee58cb71379f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd