Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 17:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url7052.hivecpq.com/wf/open?upn=OwQ2IFA-2Fm3bPLPF5VK2kbdDzFis8udhHOCsBOXjPS4J0xeSuIBd-2BH8jfkqg90YB5BM3uJc3Njzy6bz-2BFXRaZ6DL7xzMXavSo7OPGiBjqgISerz9YR50MOG0ZNkDkV1LbwMThGOcRmko4oBNjrCRuOMNp1DYMh-2FCx-2B2xpgRAjiSerYju0hRdVYI3rxrjHOafXYJ-2F2LQAuXRjLP7oN8aQVQ1aJSakGsc2F7IvTIgHOQtM-3D
Resource
win10v2004-20230831-en
General
-
Target
http://url7052.hivecpq.com/wf/open?upn=OwQ2IFA-2Fm3bPLPF5VK2kbdDzFis8udhHOCsBOXjPS4J0xeSuIBd-2BH8jfkqg90YB5BM3uJc3Njzy6bz-2BFXRaZ6DL7xzMXavSo7OPGiBjqgISerz9YR50MOG0ZNkDkV1LbwMThGOcRmko4oBNjrCRuOMNp1DYMh-2FCx-2B2xpgRAjiSerYju0hRdVYI3rxrjHOafXYJ-2F2LQAuXRjLP7oN8aQVQ1aJSakGsc2F7IvTIgHOQtM-3D
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3544 4964 chrome.exe 22 PID 4964 wrote to memory of 3544 4964 chrome.exe 22 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 2252 4964 chrome.exe 84 PID 4964 wrote to memory of 5020 4964 chrome.exe 85 PID 4964 wrote to memory of 5020 4964 chrome.exe 85 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 PID 4964 wrote to memory of 748 4964 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url7052.hivecpq.com/wf/open?upn=OwQ2IFA-2Fm3bPLPF5VK2kbdDzFis8udhHOCsBOXjPS4J0xeSuIBd-2BH8jfkqg90YB5BM3uJc3Njzy6bz-2BFXRaZ6DL7xzMXavSo7OPGiBjqgISerz9YR50MOG0ZNkDkV1LbwMThGOcRmko4oBNjrCRuOMNp1DYMh-2FCx-2B2xpgRAjiSerYju0hRdVYI3rxrjHOafXYJ-2F2LQAuXRjLP7oN8aQVQ1aJSakGsc2F7IvTIgHOQtM-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4b879758,0x7fff4b879768,0x7fff4b8797782⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:22⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1848,i,2972586481905087175,5357780491609526833,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1344
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d369b8f17af0e2508833d28bc04fa101
SHA1300a860a32297ee77bf4832598c72b800dbd4899
SHA256f08e444bb9a98b987b29502d87840f87f8c3708e760125359669890e50bb5d7c
SHA512766484504aba99018cc1e390e676692b70a55b91f67a956e5fae079c0bbce2e43f7165a8ea36f1d5e5d4ecf7840bd054f4ffb191eba7706581b3a7028d432bb7
-
Filesize
6KB
MD5d532bf4465623e7d4af842ada51b6b7d
SHA1e9ee5d095a07f3bbaffd49c43fe64a60b899d320
SHA256ccef6cd7b2a928bf2850d624f8ac260f86e58be3d39ba9cf3752f5d0235c9820
SHA51240f759d340ab80fbdb11cc4b432a6133a1c8bd6416e9e201878e57db9e123129e556577b06a7cb9b170c45d5313893f2c81731c1c7fcd3fa61bfc47309e5b7b6
-
Filesize
97KB
MD54cb23d306d1bab67ef9d1d6a270ff9ec
SHA13603ab6c8de82a594ac8d29001ce5b2418939109
SHA25659d0a6fcd77b0f38692850b0e5fd8b3f74e4474a218628f2f04ad12336d9d6a8
SHA512193c3d3cf3854431a6d59ae52b5ec00290d2ad7c2893ee0667ac0b976550243befd811f78193b7a731f666a27ca43850e500857b4aec062ceb999275db1d6930
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd