Analysis
-
max time kernel
300s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 16:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chilipepper.io/form/xhot-darkbrown-cayenne-0fa1e895-ee9d-43a8-8b44-2602a94bc075
Resource
win10v2004-20230703-en
General
-
Target
https://chilipepper.io/form/xhot-darkbrown-cayenne-0fa1e895-ee9d-43a8-8b44-2602a94bc075
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133379743801483094" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4488 2080 chrome.exe 56 PID 2080 wrote to memory of 4488 2080 chrome.exe 56 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 216 2080 chrome.exe 82 PID 2080 wrote to memory of 2288 2080 chrome.exe 84 PID 2080 wrote to memory of 2288 2080 chrome.exe 84 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83 PID 2080 wrote to memory of 4576 2080 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chilipepper.io/form/xhot-darkbrown-cayenne-0fa1e895-ee9d-43a8-8b44-2602a94bc0751⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe38159758,0x7ffe38159768,0x7ffe381597782⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:22⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:82⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:82⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 --field-trial-handle=1876,i,12807853803970987672,13088204299617835805,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5674f17045e4fccfbb91cd20f7fa04ac2
SHA1241f677429a38092b03673e5f420d1ee1f90f103
SHA2562c55d3ca8a7c07b3bcc0811cb8e566360b2c8db50f3c2d407972fdbd091abec1
SHA5125b04759187c8f735891b893470735126882876334a05f1a354ec1b1b0ffb7c2943f60b46a12ce283c172d3f2f0218b72c7ccd93b48a534569d6711f626b1e63b
-
Filesize
1KB
MD5a3ed0bc3c48ff6704127b9bfc54c4d55
SHA1f9c504735adc1822c9073f3418d9cc5e8063e5d4
SHA256353c9988590598d75bb6bd1ef560ea4910af19336346025c43b0bfa402fa1004
SHA5128bcb0a32504b594d1a31055d132ca463870f9b93b2e72db6eeadf5fa321aed90a0877dac985e512947f0ed91b978299389714cfd823ea34aa452ed2810a45132
-
Filesize
706B
MD59b0eb8f49b7b305f44d06e37a513805d
SHA1b81b65315bd0e0c8f4e5378ebdcf8dd2fb1e3eec
SHA256367bfc9494ecff17cb4ee3cb8c3b4ef13c3bb58e573b0ce584829af9a59aad22
SHA5123ea6924a753a1d4a607bb40e240e9ece0298e361696e29f153525ae743dd705fc2dda8afe85725fe8913a4c31eff4c64a006ab1359f02aa1fd793f69c29fea58
-
Filesize
6KB
MD5573900264ac165a9908e93b48b984ca0
SHA1ea2d344fe1ed7b4a7a4c01a507275b94cabfc927
SHA25699584bf81c528fe24d1fd17a0fc3afffbc239d25ea16b79f169bccec46a1d3e3
SHA512a770be0f2b99609400f5d54ad33915fe8748e5e4e264fa0308df54dbb53ce08724708df458b15a2c2bb123304f8ec355982ec0305c8f0e03f369281ae1d4c6e0
-
Filesize
6KB
MD55b04500e33af53075c07493d23cac2f7
SHA1530c9d8db4d668ea03235bdd51751da05e8e7f1b
SHA256ac5b3b0a699bd48624447fb0999c32de322c381e73501ec639a38a683b768fac
SHA512d6ef6a8710bcfe708017a1884da93a173d5c9e04b19cc8ab1e1b21c35042dcf3f2eb013aee84c29adf8cb60ac7bc95c774f8b6e45265d5d131e99fcd247d7267
-
Filesize
6KB
MD59892ae24cfa0fa9fe059c8a4f55f7241
SHA174aebcae72a4af0f40ed2ed19d1ba290037ed81e
SHA256f56bd60c50be28ea0019b866adc6ae29f74d6ca2ced0a12bd62a7538736b1a35
SHA51234c91f7bdde0094bd936372dab54bce2afd9bd8f626bbc9c273b9badefc9f8c7c759ec8e864e8191478327912e6fbe1435961f343e88ed2f9eeb0d8ed2a0c9b6
-
Filesize
6KB
MD5aca93d9ab938628b25d94d5ee77d124c
SHA18b24682ed75b147977e8e367545cc2aeab1bccc9
SHA2562a002b8001d0281360bfe36b2051540d3dbdbd0fea11a96f031d5c57349351b7
SHA512cdfc53841546630920e563e27796266fbec3722636c744ecdf6b0d513fb853d4c354bd51ac70fb431ee644f376ce1661dcf7098dc674c821cf2d02fb25f9ed4f
-
Filesize
87KB
MD52cd7ce24d3d5b9191e59b0f755f9a571
SHA1dc72872150ef958f5004ac111b0bfeea5921442f
SHA256cbd824a5cf59147993ad347d68a09b8085224ebe962e9951c070d308d6f048ee
SHA512748807b2faa0101a23e727f35f06b30a77a209cf082e9ff9d60796ea406d09425265edbdd4064e24b6213276881d90139370ba5a42c0bc822c73a4cace5074c0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84