Analysis
-
max time kernel
305s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 13:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.iedylq.us/bc95c239J5e8oJ612W181aRF_6f5K18Gc-csarwsrdfxbEGsi7kQvnQ9d6G1lT0t6rAibkW/dequeuing-idling
Resource
win10v2004-20230703-en
General
-
Target
http://www.iedylq.us/bc95c239J5e8oJ612W181aRF_6f5K18Gc-csarwsrdfxbEGsi7kQvnQ9d6G1lT0t6rAibkW/dequeuing-idling
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133379609361041845" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4808 4780 chrome.exe 82 PID 4780 wrote to memory of 4808 4780 chrome.exe 82 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 5016 4780 chrome.exe 84 PID 4780 wrote to memory of 4252 4780 chrome.exe 85 PID 4780 wrote to memory of 4252 4780 chrome.exe 85 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86 PID 4780 wrote to memory of 1508 4780 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.iedylq.us/bc95c239J5e8oJ612W181aRF_6f5K18Gc-csarwsrdfxbEGsi7kQvnQ9d6G1lT0t6rAibkW/dequeuing-idling1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8de969758,0x7ff8de969768,0x7ff8de9697782⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:22⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2764 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:12⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2756 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3584 --field-trial-handle=1896,i,12104157418266626558,1766652154400084118,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016B
MD56bf95fefd533d7c06db2c4df7486390e
SHA1be09174506e76cfa2c00e6d93c74a7d744cae783
SHA256dabe61af6a13226bbae6f3402044919d69002e0dc6d8787123dd44a0aa384582
SHA512b1184fef8ebb894d10ed19d13a791628a7f83a2c55633fe7a09cfab873e6106cc97e462758376dc3ca9f9c221f699715111925f17b12c1f6e1c6848c422cdfaf
-
Filesize
6KB
MD5c5844433a0f527c6f512b8b8aa6a6572
SHA1e8f5ed163b0a7be65446ee6f4473e7003dc262b4
SHA256f0ef9db1e356d0be20c0efe407823101bab7d58a05dad997a4e20f08009ea7a2
SHA512599a90c54ceb38a3c545a45747487d58549d8d26413a0960e7eaff1fb5b40b8944c88a5f2c2ddaab552da102ffcef26268d264eff0656b912bcecf7f2ca73d66
-
Filesize
6KB
MD5faa648a69e2d1a714db4197c28df352a
SHA1811bcab3513d4f17d804679b4f63085c93f85b2b
SHA25650bfe3198b87ad9e59655d808c2c94e7e675cc80db05369a54ed36df7b559e8b
SHA51276cad7e6815b9abca27a0e8b54028662182f70e65a123c67a12e040490fb6b26e9009a547f54c8245a4d3851b12814d8a0d6bb8f4f925416bbe20a1bb0642306
-
Filesize
6KB
MD560de5e0a98dcd09b4cc3cacc713c2dae
SHA1cec30531e51bcd19929d1f1b31b4e585adf98ade
SHA256007553183d8feb5474dde025b39c1c9b898c1690c687371466fdfa54215f23b8
SHA51207d80646ad84b0808608302d6b7e39b3c8f8762c3008916fdb938e3970f6161c63b936bb19533f678f5299da42ddccbef6401f22407b10b77968d84ee9d49876
-
Filesize
87KB
MD51d2717cea518074ce6a5106e198aa78d
SHA1e06520a2e6ab391c8776a54723df6faf6eb56ad8
SHA256c00f081a124e8591db4d679e006fdb82259f802cfcc06d77ee5a08c3ee2d0b49
SHA51212b3a88daeca06a74bd45bc7a46d20e19cf3f59e83aada8e6e16b89dd5646f423cf3dd97b74643195e05868c872e7b05b7210ec3fe8ec312027439ee7d089bfe
-
Filesize
87KB
MD5b618c2164d5b906a8e4a809f69cae404
SHA1f7b16f1a00176ae6d943e7b516ad7bd862fad4fc
SHA256e4fd5fd1a4ce2884270b6405bc3bcbfdba55388a43af64e19b0bc475a8ffb92d
SHA512bf78fd6884973fb744f25ee6f57412db30e7c0f539c9d485f30a299d6a48099a1b00be7915ee75e768430ba1a767ec4e22052f234f1402cefacf584f68ff9d25
-
Filesize
264KB
MD5b8f0750e687a4a091a1590e343bb2551
SHA1125d02e6e9243718a7e2887860999629b70a011f
SHA2567b37685350f6a1d568a87ae0798ebe5d46ccc8f5f8b73205b9d5ec0c087b9269
SHA512d210c4122bf33c4b5921f2d81a57cffc8d0fef1fc094ee02a2f3507adff7a9cd5675a9383b4e3aa06ddef155e6afff2ddee9f5b7bd09d80e39f369b3ba1193f5
-
Filesize
87KB
MD5a5d2737ce3d06954114630ff57e7d6a7
SHA1050841b14e352a02f85ddb71add0d25b47abc553
SHA25647fa59c2b80d92d3509902f85611fd23ae31c31192fc94963563e53369501673
SHA5122b53a8c75f55d098da3d50b2c6b31a8ae960f2b15d64e6e05a97161665d857482f831f5d883656e4a048889b2ccfb7abd7f73efd92e27bbf8e5aba888b5319bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd