Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 16:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://doxbin.org/upload/clickforsecret
Resource
win10v2004-20230915-en
General
-
Target
http://doxbin.org/upload/clickforsecret
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397863263240479" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3728 3248 chrome.exe 43 PID 3248 wrote to memory of 3728 3248 chrome.exe 43 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 4012 3248 chrome.exe 86 PID 3248 wrote to memory of 5056 3248 chrome.exe 87 PID 3248 wrote to memory of 5056 3248 chrome.exe 87 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88 PID 3248 wrote to memory of 3304 3248 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://doxbin.org/upload/clickforsecret1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe54439758,0x7ffe54439768,0x7ffe544397782⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:22⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4608 --field-trial-handle=1896,i,5502545635558410001,3869457014661654519,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59a8c30a79b49a3f37c07bd97ac78c6ce
SHA113ad00a9cf870fefb2afa7d48860b939056fc7d0
SHA256bdf9ba5c827cc6012ccc43703d1a86218fcef9a2b0822a11089fac4fbdf067b9
SHA512eeff00cd0b7e79fd36c8feb315581b6aebb975221ea89dcc3633b9a69eb21750f6cdde930c5b118af8b50ea17dcea7ea11bc932fc0806c06f20d50e48063c81a
-
Filesize
539B
MD5e159ba2793ea3318e0d471eae45a1408
SHA1d27f4de4c98d4f58d6b0aefe8d2bde41b7814b6b
SHA256bb4663ba0ba4d7aa41d9c908b81f9f46f9d6c2953a52b175c1b65aeeedacf478
SHA512530b1d3c096194a8cd1cf554a9cb7d9703d000a170dabcf29393831f467b311857c6f6e2cc54976cbb3a3a6fe4890fda4317a92fa1fa57b3e83ae74fa3e63a06
-
Filesize
6KB
MD5b1b68eea4e5fb5ab49d0356a7818549c
SHA1e79f172fbad67646da6c1a853b9031e7b554aeca
SHA25690986f2dbab99605ba7222dfea4deedb0408253a32c758fb319a2d502bcfa26c
SHA512804c8630f77bf5db84942c252a86eb2b605770f086406e0806b490f81fe76f6002a9f8188933e488b0cd608d13eb855a1bc3cdacc0f6780746acb868451a296d
-
Filesize
102KB
MD56797de3441faec1e6b8845a007e9fe68
SHA17f6e04b59df59fc1bade45303f509e8d3e76e7e0
SHA256c1135696d2cc4b927cf150bf08aeb42d41a99da12ef94b7be8185d26340a71e2
SHA512e295180a419e208d70e6d5fae2787a4b3b86fce3fdb06aa1ea7846581719cb4e80f4228977d8304b36a9206d3fd879ace4e91840c644a82ae790e6a79ab60ef8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd