Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 16:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://xjyi.mj.am/unsub2?hl=fr&m=AV4AACSRzdIAAcqqUYYAADiP6rYAAE-7_l8AJDDxAAC2qABlBDY4hv4_Gx_ZRbuDrDeohDStoQAAt8Q&b=9ae60424&e=4b53242a&x=HfqDWCzdgx02PEMpDnG7A0uOmGIEpkQ_rMnV7VcURuI
Resource
win10v2004-20230915-en
General
-
Target
http://xjyi.mj.am/unsub2?hl=fr&m=AV4AACSRzdIAAcqqUYYAADiP6rYAAE-7_l8AJDDxAAC2qABlBDY4hv4_Gx_ZRbuDrDeohDStoQAAt8Q&b=9ae60424&e=4b53242a&x=HfqDWCzdgx02PEMpDnG7A0uOmGIEpkQ_rMnV7VcURuI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396994825679058" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 516 chrome.exe 516 chrome.exe 4036 chrome.exe 4036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 516 chrome.exe 516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 4276 516 chrome.exe 84 PID 516 wrote to memory of 4276 516 chrome.exe 84 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 2732 516 chrome.exe 87 PID 516 wrote to memory of 4116 516 chrome.exe 88 PID 516 wrote to memory of 4116 516 chrome.exe 88 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89 PID 516 wrote to memory of 384 516 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://xjyi.mj.am/unsub2?hl=fr&m=AV4AACSRzdIAAcqqUYYAADiP6rYAAE-7_l8AJDDxAAC2qABlBDY4hv4_Gx_ZRbuDrDeohDStoQAAt8Q&b=9ae60424&e=4b53242a&x=HfqDWCzdgx02PEMpDnG7A0uOmGIEpkQ_rMnV7VcURuI1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae56b9758,0x7ffae56b9768,0x7ffae56b97782⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:22⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 --field-trial-handle=1880,i,2418559524901593119,1899649905826249153,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5232f701152ad781e22bcd3c2e8dc9fa0
SHA11c799dc81995f33de2f62d703015529a64debaab
SHA256ce6049058d298dc1b5340b1f8bf7b2693f15ca05be46c572aebaa367c01d8dd9
SHA512676897373a2431ef712864d5f5257f04b185734ce6eb55844e065919448fbc571d00e50ec8cd6c03efc544860338202d14fdf22153abc7a6af200c5f708c2ade
-
Filesize
6KB
MD57e73b9fd82a7fe6eac8cee4fa5b78c8a
SHA1626db6e88c4ec0a5f0b5b60cffa5270e30bd290f
SHA256727b42e850ffe2d9be1ad7a907d2f40178cc45c1ef1b384099bbb1d683ce8961
SHA512a0bfc384c942ccb86524e554f403e7d3838c5442c9e7e09c90acd9c97741d5fea66ec4a4afe06df7910ef3447f44c9bea9a296a2d632a07c810029cb22f1b7ad
-
Filesize
102KB
MD5d8617811c297a9d0e4d9ae8966615490
SHA17dd550ef15b98aae9caa425bdb6edf4868f1e1a3
SHA25689425bb28a78d654f0b17fa7526b10575b8be2f464c18d0339d8ca0efd7ebf93
SHA5125bc3a42eb0fb55f590bfeb5dc113cc133928fbffbc35eeb9167496f17bb580f0f75e494f33633bb3d4481c67c4c42df733071b854d3885d5069d5012d55d2332
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd