Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 22:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kekma.net
Resource
win10v2004-20230915-en
General
-
Target
https://kekma.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398099695352225" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: 33 2796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2796 AUDIODG.EXE Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3084 1352 chrome.exe 85 PID 1352 wrote to memory of 3084 1352 chrome.exe 85 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 1184 1352 chrome.exe 88 PID 1352 wrote to memory of 4860 1352 chrome.exe 89 PID 1352 wrote to memory of 4860 1352 chrome.exe 89 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90 PID 1352 wrote to memory of 1980 1352 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kekma.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe2afb9758,0x7ffe2afb9768,0x7ffe2afb97782⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:22⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3848 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5028 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4692 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4816 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3260 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3380 --field-trial-handle=1900,i,8478164980332890746,10197529427418167892,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x3fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD56e924801a738075aa47c714652e897cc
SHA176dae5b9f81cba569f7512e69dddb5eb9bd965e1
SHA256392be6338f10c6fa36ad273edebfac127d4db50a580071aefeb0765f3f118294
SHA512ad1397f088ced62be8d7dc0555ec02f2f3bd41e617e5c83adec94dda83bc8e35048aad6033d651de9d008365e9e68d650750853f8ac2d1323e36594dba7eda94
-
Filesize
1KB
MD505baecefd5bd76d570d8edb98f697820
SHA1058af1829208d649b701f67549ba45f617567326
SHA256d0389ad32fdeb10f5018bb9b87266f5eb82f7da6ed8f7456e22ae10ee24b5d51
SHA512a4e0bde2448776047b186615ca8eff3bb2b2da9d008f61c50dd23680476c970ab373b7d1a226fb2d9f544825400d2d11c70a56a7496e82125bc6c9ad45f21259
-
Filesize
5KB
MD5aec725c5b5f7b9ca1c5db27b6cc140a8
SHA16954176cfd13d7903ef2b89751dbc004e6000390
SHA256506c1ad362fbe1abbff054c8be8a4799ad3815926cbebc753aa15f502496f0c7
SHA512bb2cebaba3c7c16a0399c1ff6ec449e6b26522ee72f01d07fc5a2be2b70e264b889d55c1490bafc242b1feb74cb7657acba982953605dd32a81aca08e6328df3
-
Filesize
5KB
MD58a008359031895573adf873ce4be2da7
SHA15541e1d0f3e0a3bf0596469c1bdedad9dd7c9d70
SHA256f9f7c1bdb0969dae2976e4ef239cca5ba49fe06537dd3ad6a8ad1dc35c455b14
SHA512f4072db162715779e0f2a12df7fa9890137d6528df918ce57a6f3dd1b5f2121667955ab1a51b1a4470a9f8546802e58fd58b9d55370714a17e604712ac435bb3
-
Filesize
102KB
MD566eb4f2843d9461d8c16f3b6e783023f
SHA126c447913a2e5ff80a7c8cafe269acfc265dd932
SHA256d147554a8a5ff66f404968b4e662808f3e44ea3f2747a0ea13e7b354d582620f
SHA5123533ccf7b5441b1aec10217323443cacde1d7a429c54f047f201b475910ccacd93d40a30895b001cc04dbcac865024ac2c9c87e48b7d19f232b68d80d7954a0c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd