Analysis
-
max time kernel
118s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 06:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t-mobile-c2.com
Resource
win10v2004-20230824-en
General
-
Target
http://t-mobile-c2.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378519430362366" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2456 chrome.exe 2456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeCreatePagefilePrivilege 2456 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2640 2456 chrome.exe 83 PID 2456 wrote to memory of 2640 2456 chrome.exe 83 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 64 2456 chrome.exe 86 PID 2456 wrote to memory of 776 2456 chrome.exe 88 PID 2456 wrote to memory of 776 2456 chrome.exe 88 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87 PID 2456 wrote to memory of 5028 2456 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://t-mobile-c2.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb29c69758,0x7ffb29c69768,0x7ffb29c697782⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:22⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4796 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5280 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5484 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5640 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:82⤵PID:500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5812 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4920 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1624 --field-trial-handle=1848,i,11943379085379025186,2540063467754789739,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2320
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dd20f6400276482b8934b4e1f9320095
SHA1df77ab64d9fa3bb760fabdb00419854ba3923233
SHA2564d9be7a26b1de68bbaf23f2a4988af8df053572698c2852b2b94716fba60c909
SHA51274451741d206ed15ffe8def80f3d5b809eae5194f77f8237be87d056947a49424c947908af4c91944d3730e605debbeb2560ef6facf8da52bb51ab71ab564667
-
Filesize
371B
MD5843eeb0db866055fd52bb602c7c7c39c
SHA1cbbf734e23a68fe12af4649bf08130ee2989d1f5
SHA256a8b5a2fa0e0b71dfdfd1ee5e4726f80516030bdf5f85030e582fa09e51f9837a
SHA512a8dad0b6d21656e9a86e8cdcb4eafc45fbecbc723cf149577f65ca7885930327d832210feb79f97d8d92219c8b1080813a1a06a482cc813dfa5ed63d8fb05e30
-
Filesize
5KB
MD50d1ca46e475ec617cd558c7a97105761
SHA164d8ae671e00f407b1e33bc20fcec8c07c71ddc1
SHA25677fa25bc4dda08fd8cb6c72868c48ddb81105da4c7913fcfd760bd318bc8f797
SHA5129378e05262c95b3374b7975e3cbef554ab94c881986409f8b39d58af122a839ea23a48be72e14a25142e2cdbad6099511ec3d82da7ad3be5b7fd85ceeeb514d5
-
Filesize
5KB
MD53ff03be188667b96c1fa087806b64f49
SHA148225aa1f7a18bd9b2c2f4011a28ca0b1774f599
SHA2563f3fba820b4b844800811b299f29242b993e7aa9110bb052a8d878597edea80c
SHA5121458139b62307369be75e0c24c3279d310971f42d2aa9d09a6369537de9b4fe89fd524a860e954724814ab02e8172fe1246ce2deefa01b3d30d12cf60dad568f
-
Filesize
5KB
MD52e092afe102477935f4fd56a126d6388
SHA152caf7d99b7a1d12e3e053e08fd4539f6e28e8dc
SHA25601c454eda51820d9efc863c1db823c4d924bdc35f256b5503bfbc2a7f38cf25c
SHA5122649159fd66960055ac4f98822b5d0c45839d3a527d6c1c70cd02f151ec8f4049a4882dc1cc76a8affb7ca258a02e2277836249373e18747583337f5fd023587
-
Filesize
4KB
MD5cd0f9787cc304e09e18aa3d6703a5b9d
SHA1470d130b979a7a5c86847b5858d911c6d3f536ac
SHA256e6a490da0ae76473a889935781ade774b05044ccdacea8673fe3b241ea352bb1
SHA5126c54a2bcf4632e734dc9ccc5ad1dd9f5daf1d12e89bc00291ce0fb6508bbcea8ccf8467c2e709572b87f407ff350713b3799834385f3b114011e1202a4bec464
-
Filesize
94KB
MD5cee13362114823861ee76cca9646ea99
SHA190062440c55cf00f8cda4d7214deb20891c868d4
SHA2562b072425ab92d0b65f83142e537bf3aced9518515d7810101c32076831403165
SHA512c3121a800540c982c1348be403c1ee28532ad2759b4dead5495fbbe52dab5854a787b477535e4e673f8855b4ad8ab2b9bb287c72d8f1aca004bdedc8394488d7
-
Filesize
94KB
MD5dae15396bfe3ca1306d1d8ed65424446
SHA11ae197a85a6e480042ffcb7d9639bc1b4fc7c989
SHA256fd728ada1246cf6de3d6d379018bed939943d578988a3ac88e4472bbfaffb3ae
SHA512f246cec255f691db0b5dcd8b14d09f0a2a01290e80f2d8c625284bf3cf7ecf41f3eb86fed01286c09f1a17880536a9e7e11ef372df1a10b9060e991b979611cc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd