Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 23:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.sidekickopen01.com/Cto/I1+23284/c3ly-04/R5R8b43j5W1c1kQG19w-22W1-X_jr1QrL99W1Vq3kr22Wkj0W3yN-t51N7bNcW22Y3N01-CXGbW1V0MQZ1V2lXPv25tnj1_m1
Resource
win10v2004-20230915-en
General
-
Target
https://t.sidekickopen01.com/Cto/I1+23284/c3ly-04/R5R8b43j5W1c1kQG19w-22W1-X_jr1QrL99W1Vq3kr22Wkj0W3yN-t51N7bNcW22Y3N01-CXGbW1V0MQZ1V2lXPv25tnj1_m1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395543099705342" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1704 chrome.exe 1704 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1704 chrome.exe 1704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe Token: SeShutdownPrivilege 1704 chrome.exe Token: SeCreatePagefilePrivilege 1704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2976 1704 chrome.exe 86 PID 1704 wrote to memory of 2976 1704 chrome.exe 86 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2536 1704 chrome.exe 88 PID 1704 wrote to memory of 2152 1704 chrome.exe 89 PID 1704 wrote to memory of 2152 1704 chrome.exe 89 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90 PID 1704 wrote to memory of 376 1704 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.sidekickopen01.com/Cto/I1+23284/c3ly-04/R5R8b43j5W1c1kQG19w-22W1-X_jr1QrL99W1Vq3kr22Wkj0W3yN-t51N7bNcW22Y3N01-CXGbW1V0MQZ1V2lXPv25tnj1_m11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffc681c9758,0x7ffc681c9768,0x7ffc681c97782⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:22⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:12⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 --field-trial-handle=1904,i,16515011814151078048,14182431014386323029,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5569e8a506a47d180815494b91ae71fb5
SHA1eb871ad528c0183b97ce1305e198c9395f0bbda1
SHA256b484cf7a4738cd00c2361907550fcc4de12a89b136820122d93eb4bee7603f97
SHA512343429805bcd1138f31610fb763b14cd78a779a4cf70c886ee03ffea269173cffd6c48ea6f9233d67f3316a95dce456608c7c936d5e4fa23b07aacaee357b05b
-
Filesize
6KB
MD5de32b5ad19f053bfcb3c9992b1319c68
SHA19db8be53ba464ae340da9aaa7095b964c1888b40
SHA256482b26c01e3f003cb4d7d093f8721cb2c4386af6f061cb67a49adf4e9bf40a25
SHA51244e7e8f185e1025e56fef3be85c564b687a998a3dff72b3651c496fac2301ef011474d4c9276c1bbcd8aa3d345148b45d21bf5dfeee7fd03c40e04cb4c12f3c1
-
Filesize
102KB
MD57d58e7a44c88ebcdde9cc9385b66234b
SHA107168efc531f955ca820d0db8e8418852b0c35bd
SHA2567e3dcafeecc925a1cfaeb9da48f9c4d7e2c77737ac85d815ad32a2dfd072c662
SHA5124685a541e30dce45f1e64264f3fe88a5f319516f521c6fe3efbedef0b2f756d7d2429afede3241f1a6d21460d60ba2b920bbaf1246e714dc7194227c30f5a0f8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd