Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://3q9seys.ru
Resource
win10v2004-20230915-en
General
-
Target
http://3q9seys.ru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398812710251355" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2444 1320 chrome.exe 48 PID 1320 wrote to memory of 2444 1320 chrome.exe 48 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4644 1320 chrome.exe 88 PID 1320 wrote to memory of 4564 1320 chrome.exe 90 PID 1320 wrote to memory of 4564 1320 chrome.exe 90 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89 PID 1320 wrote to memory of 4456 1320 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://3q9seys.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca5889758,0x7ffca5889768,0x7ffca58897782⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:22⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4032 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3240 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4144 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4160 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2184 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3260 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1892,i,11705015958160800621,11566880486580954682,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59242896ec96d2fdf441dd940719709b4
SHA10851d5946041554985f16f487291e9375ed17d22
SHA25626e53efd8e89ec1411b2193641bac370b27fde2451818fa0f86f3d4a2122c22f
SHA512bc2c256d17dce70d86b41890b45e25e3abed2f24a8655e526ae8e3b3cdcc918201fac2f894336bca13593705678f0f52b9a2d7b789789e87a419473f6768ed48
-
Filesize
6KB
MD5153e62fca97bbe5340ec2dba10b9e17e
SHA196958a9876d578be47d8769c76b8e897a0af638c
SHA2564e1edcd3d32090bef507ef656bf712b2b63d1caaac28aef6a074563017f57a81
SHA5127a740d2d80d76c270718248f644e9d64c3ea6dab7096f5996888ae938e93f87a82a9c85e3e81f38d86fb5d7cb30a619f1cb2ec1bb131b435fb37c2831f3be087
-
Filesize
6KB
MD5b685a15bd3971d6011d87c9ba8f47e43
SHA13349fff289cb70666ec901785decebc5f5cc1584
SHA256d0b5007bb082e10305eb4f640bf5b6e45ccd4c6783e1bbbd262467b732e9a211
SHA51215ecf585baeabbaa0d6fd9b15e548a00b4904712a55d7e47b52ec1f1602ac2ce0ab373a85d0cf06dac4d41e0efc05c04102c45eaf106be03ef47ea7cbb56e6cd
-
Filesize
101KB
MD5e255b7ba977cc92b06db925b2e60e3cb
SHA1fcf34ea72981b26bd2de59c243d40253b1335359
SHA256ea95c606e9f6e55b556dc5786255fefcaf95d7c3788959ad2e2eff904f731580
SHA51225022d669420ec8685129915de5f35b6bddeacf6c73988f66481b74ec79ccc9e760bb980809d82a60919d80c056cfe093dd06ae3a68c03f6cc87e188417f0431
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd