Resubmissions
06/10/2023, 21:21
231006-z7dreaac55 104/10/2023, 06:57
231004-hrd9kahf9x 103/10/2023, 02:22
231003-ct2vrafg31 102/10/2023, 04:37
231002-e8wndsha29 130/09/2023, 02:42
230930-c7c4jshf47 129/09/2023, 02:43
230929-c72f5sgh43 127/09/2023, 01:36
230927-b1pnbsgd52 127/09/2023, 01:36
230927-b1gbyseh2t 126/09/2023, 23:54
230926-3x9ymsfg74 1Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2023, 23:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dstat.cc
Resource
win10v2004-20230915-en
General
-
Target
https://dstat.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4708 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 8 chrome.exe 8 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 8 chrome.exe 8 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 2016 8 chrome.exe 30 PID 8 wrote to memory of 2016 8 chrome.exe 30 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 3784 8 chrome.exe 88 PID 8 wrote to memory of 1688 8 chrome.exe 90 PID 8 wrote to memory of 1688 8 chrome.exe 90 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89 PID 8 wrote to memory of 2440 8 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dstat.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95df99758,0x7ff95df99768,0x7ff95df997782⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1884,i,8715563166666948960,8087675723797942160,131072 /prefetch:22⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1884,i,8715563166666948960,8087675723797942160,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1884,i,8715563166666948960,8087675723797942160,131072 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1884,i,8715563166666948960,8087675723797942160,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1884,i,8715563166666948960,8087675723797942160,131072 /prefetch:12⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3624
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4896
-
C:\Windows\system32\PING.EXEping 193.35.18.201 -t2⤵
- Runs ping.exe
PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5685eef9da67d3ac991c84cbb668d019f
SHA1a09cccc7c8f16686f6eadb73351f3dbe1eda46b5
SHA25610f6a3a284faaedb669df0271202e549dd5daf6d43308a211dd885808dc5b203
SHA512d98082e5b53d8d48ab86458d57425263d9d40367d75459367bc7065810871ff1070c84ab2d3006e045be71250bccbaa98d1781417cddc6986601c2248ff6a0bd
-
Filesize
2KB
MD502c68e0c162de2bb1f4fe167888111bf
SHA115f77c0df28591f470e14c0d93e0cd3708bca5ab
SHA2568f183074a500a7ecd7b2a06553bbda1023b172987a6528fb64345f780e5df210
SHA512b5cd61c82896233935102b07df8427714fda00cc7e91d3b3dddb199c19021cd34b282769de3e2d325b86f19b1fc67352203aa2519aa95146e75ab8de26a1273e
-
Filesize
874B
MD5fcfba4e22380c5782ee74a9fdd0749c1
SHA12905b4af05a09f2ba052c7a3eea7bba8e19e1ed2
SHA256eb0710945e847d445358fbed8d783d11d3d0bf0b58a534aa03ca3357576f0fdb
SHA51270d4fb50146d072c46b6d60314ca427eeedbe5fb4ba33b6bc044988f6d86188034cb879d98acd0b22498d666d8c4c05f5bdfbc181ecc5511c1215af0d9577119
-
Filesize
6KB
MD588ad60da46cc5eecf18093f75e3830f3
SHA136fbc18547f6884c8c556bc35fd729ca8760ba9b
SHA2563d4e8b054e3c0c3f959a742d1371da7447f8b2c83fd77eaf71288abb651d2548
SHA51247a7c857bbb9502bfd79c2da359263382780a841d5b9870288e17137d881548b80bc8af01e27c3920f459ea2b04b5e80e8557b225b776cde5d649878a6a4b450
-
Filesize
101KB
MD5bdda7622e30b16f38d0f904182f090ec
SHA18f4a463b6b46f695556cc72e96eab1785709f00e
SHA25697d6e8065d2a5962c62146b377f8c34429c8d8e56ff3739018c0191f9c733966
SHA5124654186876c4af3dd14265ef5ec655e1fbdd26e0f37077104ab4722a08c5dceda5954f48b0e3546b0eb1676ce8be8c863985b95cf4f72668eca9acdab2eb607a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58