Analysis
-
max time kernel
1200s -
max time network
1090s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
23/09/2023, 11:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://antea.co
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
http://antea.co
Resource
android-x64-arm64-20230831-en
General
-
Target
http://antea.co
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133399411186965548" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4140 4480 chrome.exe 70 PID 4480 wrote to memory of 4140 4480 chrome.exe 70 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 2484 4480 chrome.exe 74 PID 4480 wrote to memory of 4912 4480 chrome.exe 72 PID 4480 wrote to memory of 4912 4480 chrome.exe 72 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73 PID 4480 wrote to memory of 296 4480 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://antea.co1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff945679758,0x7ff945679768,0x7ff9456797782⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:82⤵PID:296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:22⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2600 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2588 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:12⤵PID:308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4060 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4068 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1844,i,4330740699039524322,14591285431415131940,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e297a98cea5d2ba2cc81e48a574bf659
SHA14c49368a7a494e9fc1f0d1e91a13df70994b20e8
SHA2560fb327b8f836d7634136b61e7415bf3630167b92ce9b1a3ed6f5afc02ec01c8d
SHA512db447ae177b971995f36428e933f0d1feaa417a5cb2cb3ba376e0f36aa948d64be6602c49393e838566ecbec78e1f48b31a167aade63825d579325f96c564d62
-
Filesize
6KB
MD57a235ae55ae4e42cbc469528d9c0b90a
SHA196d1913590963851bbc5e70b66ac5e540b82db4f
SHA25646c34be73ae9a4fffbfc6ec642df37bad89556fc651ae655b3e3a835fba918a2
SHA512a70337d26e33ae1dd2972deb1117cbca5248b257a2d23d8e7713e65457841ff727267cb6aaacf196e01b1e9dd9f5d807e1482a40cc3b0a492c81d53972d6971e
-
Filesize
5KB
MD50245e65ae157430dd0ff05028be1c53a
SHA195d4bd59f48a05116e2bb71a12901861b1d3ec15
SHA256d47ff139600ba7c359d5c22ce31fb20f56715d495d331435837d7a2b32e22352
SHA5125bf70d1aea8058bdfd4e3313a352061fcfba8651a4c20083fbe0a3bc9ef8fd8bc48986963134b270f801a9b995f156e7d5eaaee17b751dddcf94741e91ac32f9
-
Filesize
101KB
MD5edd950badff17626dc0d524479935664
SHA19ba66d487b2a4ac9eba1baf8459b5bd160860a54
SHA2567a8aa952eb4a56e30a1daca5d61c998ce53b30641ea999dc5e6d5dfa69237b60
SHA5125cdefcb834367db106665150fad097ffceee5640b6e3b221a5cf4fe88bf3d2c8ba04e023cec52fbe3f908e7d3ca7a32db6e47075fb39ac9c22c1301dd8cbf56e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd