Analysis
-
max time kernel
600s -
max time network
493s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2023, 16:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hds985fb4rzphg8kew1l.hhp2c.ru
Resource
win10-20230703-en
General
-
Target
http://hds985fb4rzphg8kew1l.hhp2c.ru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378874394423760" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 3884 chrome.exe 3884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1496 2156 chrome.exe 70 PID 2156 wrote to memory of 1496 2156 chrome.exe 70 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 4840 2156 chrome.exe 73 PID 2156 wrote to memory of 2720 2156 chrome.exe 72 PID 2156 wrote to memory of 2720 2156 chrome.exe 72 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74 PID 2156 wrote to memory of 3780 2156 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://hds985fb4rzphg8kew1l.hhp2c.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff95d479758,0x7ff95d479768,0x7ff95d4797782⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:22⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2636 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2632 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1660,i,6728246805447124464,2216664251555049275,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
6KB
MD565481b0822470fe7d86658b9ebc3e2e1
SHA1b1fc2e7224978b153f73662f5391f1e37f6dcf3c
SHA25635b6f066caef35bd19ca1b2b4e42955e9b8057744a3761deba398bfd1b890250
SHA512f6a4f0fa79c77816e1e6ef1854a449d4c902fb26e092264edbb459ddf186c320e17c89068d7b9262d3d9359297e4e0058ab84656ebbe038fab0a57363b4a0f94
-
Filesize
6KB
MD5625f5a0abb70777001d4738de4466ec9
SHA17e9dec1d10917ecbec604350d2a85bfb51513c85
SHA256b30b51fc23be0cc7f898be47e642759be7fddbe8b1f5562e405729080179e3a6
SHA512aceee34510bbfac73bc95aeadeec763df48f3d21a8611819d9540ea327337847677d207299fe74bdd725c4a5f1c760dd440111d66193900cc65885d463f0ab26
-
Filesize
6KB
MD56adca6e49d1455f76aed9180364f0f52
SHA15e769f1036e51e11de4d4dbc4ae3e11d4a589b85
SHA256dc448f4f59a9120cad7cbb8ef74f27f8604b09bf77e38cdbb9ae55b7924b9eea
SHA5122c195c1cfc307c5d6642e7e883e9dfcfc986429776c910ec841dd56360f4bf6bec8ed5332e96a75abdb6a62e8a7b1ad64887726eabc13fa3eb4927e20bf78577
-
Filesize
87KB
MD5a095c6833b2ba685f12881e023421249
SHA106904830cb97715fd00f8af0cda6d493333607d9
SHA25601bf45cf39353abc2dc31ecd243b4c1495ba3b5f99c32571c8b8be9d6a191af2
SHA512ff177aba8d503b7208ec546e738046d3992a39ebb806e4282c523be3e54b610da1fe569ecb1ac5f43dcea9d364d5e2df19f3fb043c5ff883e7e3d92bef98ec1b