Analysis
-
max time kernel
60s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 07:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://s.viisupport.com
Resource
win10v2004-20230831-en
General
-
Target
http://s.viisupport.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382854002070775" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2776 1036 chrome.exe 20 PID 1036 wrote to memory of 2776 1036 chrome.exe 20 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1856 1036 chrome.exe 87 PID 1036 wrote to memory of 1576 1036 chrome.exe 88 PID 1036 wrote to memory of 1576 1036 chrome.exe 88 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89 PID 1036 wrote to memory of 2540 1036 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://s.viisupport.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffb3e0b9758,0x7ffb3e0b9768,0x7ffb3e0b97782⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:22⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4380 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1856,i,12680720225354647697,8885104290914025584,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e9c328130e5ee4fd7cc6d595d98c27c4
SHA1c0643f62ef0b1bdeb9e7476feea6db61138c59d5
SHA2560a1b1aa75d4acfb2911f7669d22639f1a9399811a17eab4cdfb2f57ee6a3486c
SHA512ddbaaf81e672483b805d93baa7ab9cc5d58fc3fef85abc9f7f4975f57c2d6447c4e4939c5c5ddf1953d3d574046a147ad809d48df44e66f8bdc5a53d1581c3a4
-
Filesize
6KB
MD5b8658f6cf863f7e3fbd5bd5e497a40f3
SHA1a82b2bb3fe7a333dc26b179070c1e0dbd9c513fe
SHA256ef241dd17adddeb336ebd67a08b471a8d4f8f2ee7b8e4b6d6242b6a6ec09f473
SHA51268af755f5974dfaf3a1e92454f73cb2aa8bff7335db2d0774616b0b74e814c1fa98b892781d17a258fcbc50d4befad9ece9bc119eaeb46b56800145fb0579f73
-
Filesize
97KB
MD5a905c6a85f8a70115a6b21a8411162fb
SHA19d8747261e6f840303ca0d104338ce986149e77d
SHA2562f8154a3d18995c422a8e5276f6268308a3f5f365728157597872225283f8cdc
SHA5128a5efd9da4758cb9212f601375561d0d0f71ed71b01900d6fd8f1ff2a924b01e4d85a5b78a8890bd090d44df169ba534f46d7f05be8f6854f504b80b5d16886b
-
Filesize
101KB
MD5cc4a6d31ccdea8421c7e55eeb414fdd8
SHA16b6701cddb81fc5b25f39ceb8fbf8a867b88d31e
SHA2563aad3feda500d5a2d4d3d088500cc2d58bb08615a19b86e0ed60d4482c4407f6
SHA5123ca14e74b44df1244ff6bebcb1b895f28ba0dff15f5828ea68639cb5902a7d2e46309b7c69e45a0da7c8310283fe2fe1f351a2556600dbcd4e55e1d4e556623a
-
Filesize
97KB
MD550dce4d4b3fb9362ad1109251b7a7ff1
SHA1aa47b63fb44833f69d54caeefe90351baafd76fa
SHA2568b9575c4469452928642eead799a2a5f01ce179a7cef7b3ede2c6584f76014d6
SHA512f5ccdd2406e855ddde4e38856078ae8ad4407d06fd7505e9be48fb44b4011664ff731d2340926d620eccd79b365a38c68a57d70d0501aa4c9bb570429ff84c2e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd