Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 02:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://auat0astg0v.cc
Resource
win10v2004-20230915-en
General
-
Target
http://auat0astg0v.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407744734320762" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 984 4120 chrome.exe 61 PID 4120 wrote to memory of 984 4120 chrome.exe 61 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 2892 4120 chrome.exe 88 PID 4120 wrote to memory of 4712 4120 chrome.exe 90 PID 4120 wrote to memory of 4712 4120 chrome.exe 90 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89 PID 4120 wrote to memory of 4452 4120 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://auat0astg0v.cc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafa9a9758,0x7ffafa9a9768,0x7ffafa9a97782⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:22⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5132 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4824 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:12⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=6008 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:12⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 --field-trial-handle=1876,i,13736349855663219768,3289132400836162892,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD59ede5d49216a6ac0f3b0c850585d5ad0
SHA1e7056d8a7cef68e36698fa7d52e490db3d1a1b97
SHA2568d045231afa8499ded123877dc9da46e6bbd6ae8c73343ba827c4713338c5c41
SHA512b9c4242a043045e8f8daff6eff40c51f6a18e4fdba173734f9631a34f934023f4a13581efd89e63f738f73a854ad3d2183c866b3b4badceedc312cda9c3a4323
-
Filesize
2KB
MD51ff21f3cc3151df5a460f7cfaef93e6c
SHA19f7f16419beff577916f501cbe6f0716f1aefd41
SHA2560e9ea89bb3d9d960cbb60ee2853ddfce7811c5f6b56c60168f971536859eeecc
SHA512796ebdf42246dcdeb17feeeb15f099e1bb9312b18891fe0f1a9362d208c9444fec764a761cabebe37991bca03413649788b4a83d10d401c486fc88673c6a3075
-
Filesize
539B
MD5ea5b81765b596d79eab939f120f89597
SHA16ae2305b7d5f80104e5ba70644cdda4520c2d169
SHA256f221861c2093ee2f42779e7dba1882013e046c6082e1d569b7e9fca11ddad554
SHA51243e23ad3755d12217cdd571ddda835ade68326ad297ec2aef7f543849277dc0fc39de5785bbd122df49035a1b0b97aee5a7074467d5bb8772f2633514e0e3d8d
-
Filesize
6KB
MD5df5a80c0725deb1085d95ee7c2e4269f
SHA14c7eb6578112c611527f4f085591f277c5da21a2
SHA2564545a2ee023af7865ca75e7f92f01f36fbac88939bc695c9bebde88795f32c29
SHA512c6498335887521d6d69e88f84e805630b1f7fe02a91344a2b2212f64c2700ad33fd914efe3a61b2208f759c9facc35fbd588c29a3c17097f985face28c617669
-
Filesize
101KB
MD5355a16eb298ef5051ec272552dba9a3f
SHA15dc866bd1863404804f64d7ffc69909e8ddf85bc
SHA2568083356645add545a20efa05269449a1298f46c7b2f5ecde33f35842becdba53
SHA512d5f86f5a4d0e0be5bb5d745be1f4db47c3818095db94f6451ff37155400b19eec2a4f6f8a2db2d7b6f0c54243d939a68188938004a0757c1cb046bb089421763
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd