Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2023, 20:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wiggin.highq.com/wiggin/sitecontroller.action?metaData.siteID=855&metaData.parentFolderID=9539
Resource
win10-20230915-en
General
-
Target
https://wiggin.highq.com/wiggin/sitecontroller.action?metaData.siteID=855&metaData.parentFolderID=9539
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397139203296845" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 1636 chrome.exe 1636 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 3780 4164 chrome.exe 70 PID 4164 wrote to memory of 3780 4164 chrome.exe 70 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2116 4164 chrome.exe 72 PID 4164 wrote to memory of 2100 4164 chrome.exe 73 PID 4164 wrote to memory of 2100 4164 chrome.exe 73 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74 PID 4164 wrote to memory of 3044 4164 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wiggin.highq.com/wiggin/sitecontroller.action?metaData.siteID=855&metaData.parentFolderID=95391⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff99e0e9758,0x7ff99e0e9768,0x7ff99e0e97782⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:22⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:12⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=936 --field-trial-handle=1704,i,8526261303917398903,397290430346789342,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5a75d929d34366bb794fe7edc47cf8a7d
SHA11c5698ac153dd06e0033d0d1e4bcaa9807ce8ef9
SHA2568cb9f08374271965b9f2be4ae111e115c0f29988dbb07fcee3b7be91168e414b
SHA512bdbbbcea4b4533840a8fb37a68737ac17fc1e4e709b602da17f4e4c408c192b5c9377696565a085d045e9834e6a54fcf73da37aa8fa3a1e40f2fc8ab6e064a10
-
Filesize
2KB
MD53a4e7424bb0054e741b7e3c625fdba50
SHA14e5d228d9d93653a6ca186c8a34283006a509660
SHA25665c460fadb8b80c23ef91f4ce2158bc8396620365565a4ea48e77b39b524174d
SHA512a1e59ba8c51017972313704561cca6da72c1f6dcc58fa0979b7e0bc308654f9589c65317173d60464806d266d6627596e958d84a75a6c4112657ada80f4a05b9
-
Filesize
1KB
MD53b16e908a225334d2d2778826d465c16
SHA1d2c98a649bca38db6229e0277e981a83fe13575b
SHA256143195f6b60002e0a71d6f791c427f293cec04be175a6af9fbdca484f6d41ade
SHA5122a030babc8a5940607d33d69f467ae5632d6d679a6b78ac66d2f639d6e3ead2107ca46dd9fc84477540fce4a87bea37b5ced97eb132797d5f27a160731ed9639
-
Filesize
706B
MD53293a274f4f7dabb580aefb3af4c3a95
SHA15bc4bdeebda149ece0a26704c68cc72147b88813
SHA25611fc7206a825aa7057e2fae613b07066d15c8a6ff0e0eac8d435ddb7d2395ccc
SHA51261cf621eef19f58a9e314b1fa2dbd2c8cfeba12ada4e34d7812983b0a353e10e9404fcba3994d0a50fbc2117a01a862252430441c187a627d7461f68e6bc7190
-
Filesize
5KB
MD53eb63a94df94761e8b466252631e2776
SHA1b5b3644c4aff9a7ca370a862d2c2890bae253b57
SHA256753a536d36d259562ca5ba53c516774fb157818454f796c034fbfca90c8e6955
SHA512da8c83c098b20fcbd787df68936906e5a61af10840142a9ab6cab4ca9e783d524f5089c7f2925a3013577e84b06ac242e49414ab41a6232762abea9286773f99
-
Filesize
5KB
MD5f07363bcd9d070658303f845d687cf06
SHA184a9c5cdd9a47ab84881022cfda6e4a56638a57d
SHA2565807a00e4aa2aca7326e6718b562166b04b9b12244857fc5664ccacde687d96d
SHA5129364aadc578df08baa3dbb624a50f236bb0a3f73622ed4f3bf6f7a4a9aaf36e6019331351a5734d0d77e3338bdfb3b33805162b4f85bf7d8756a9747b35f99c6
-
Filesize
6KB
MD5916ecfa2c6b50cad089b0cf639cb19cf
SHA16acb994302744f4576a6f6ba8cfc61bda8bdbbbb
SHA256205d669b5b14b97e006fb46481bd3f93e9d490c5554791b2c339264b2565b2b9
SHA5124abf8b9317b9fae0d2ee8f9bf31aae323093254dc0f44667e752ba247eca0ecea32137bafd11aabc03ab495c0c81b1413ecb31a6dfa8a060348cd6210bdeed98
-
Filesize
102KB
MD5432af1a68f3e97c6c134e2b41a7d2bee
SHA1e845366f0a1d30a2177f0a59293f330200671e00
SHA25670dbd3d5953d34d9090323cc96b5a0199238481c730e9a544a67563f5d13667b
SHA5127f2bc5153bb288f5e2804cd2caa6d704c52a939cdb6a69fc1e218022935acfb3515c977c97b8433b56d1a38aa18f28dd1b1ef51af13f060d640b0e8e94efc52d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd