Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 14:58
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.io/ipfs/bafybeihowfaxbgje7eh2h743wp4txem2zdjbebdlgnwxmak4jdxenxafki/oracle-document-cloudapp.html?cfg=Y3Jpc3RpYW5vLmdpdXN0aUBpb25ncm91cC5jb20=
Resource
win10v2004-20230915-en
General
-
Target
https://ipfs.io/ipfs/bafybeihowfaxbgje7eh2h743wp4txem2zdjbebdlgnwxmak4jdxenxafki/oracle-document-cloudapp.html?cfg=Y3Jpc3RpYW5vLmdpdXN0aUBpb25ncm91cC5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408187372283365" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 2216 4268 chrome.exe 87 PID 4268 wrote to memory of 2216 4268 chrome.exe 87 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 4904 4268 chrome.exe 89 PID 4268 wrote to memory of 5056 4268 chrome.exe 90 PID 4268 wrote to memory of 5056 4268 chrome.exe 90 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91 PID 4268 wrote to memory of 4200 4268 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ipfs.io/ipfs/bafybeihowfaxbgje7eh2h743wp4txem2zdjbebdlgnwxmak4jdxenxafki/oracle-document-cloudapp.html?cfg=Y3Jpc3RpYW5vLmdpdXN0aUBpb25ncm91cC5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61ab9758,0x7fff61ab9768,0x7fff61ab97782⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:22⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1808,i,2090448292956140003,15030556048524207955,131072 /prefetch:82⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ff875c033e5b895bdd935e16833e53a1
SHA1cdce9761eca8c7917ea191e14597f0eeca4590f2
SHA256caf4e192fb0db2de1cddf638f856c1b162f2f094a376fd607fb46f8c822c9adb
SHA512448aad92f6d878a8483a6c524f3616918aacfb94a49a636c43e097186cf218b211183bd9244730dcc466188cd88489022fd5cd6ec0515dec897c91227faccd2c
-
Filesize
538B
MD5a76cb2e9794016c4ade5d4fa7afd5021
SHA1f986330c86bd4218646c81c1685c8d54293eb077
SHA256a815a5af2554dbee7a0c283e4940a6d3b76ccb85ea2fcd97e330bbba5d9f4980
SHA51242af18de27cb15fcf568576af29f92efebd88d741718b96c500b7d1058991173198ccfcd3b91ae3cb5d5a46f4819437e0edc9a333be4da2f5e560d6e274da68b
-
Filesize
5KB
MD5c11583c25605758d74e46f6e5ce92948
SHA108634c76f417d9dee0a7b0651ae38afc4b86191e
SHA2568a80c52fca3fed8b4b738e63b8fad68872eeea47939e03605061f54b6bd5f158
SHA51231f2774c4481204192cd8900fe234678a44bb8801a31367c8d30e98c1f07ae63c9b8976f5740a749de3f5056e54d5958d6a0bba753c598d6fa530f3650cf3e1f
-
Filesize
6KB
MD5c872f51f0e8f356096a6fbf09ecd4164
SHA1a39a713afcfec8633531c0d6d3a157a9ce1d120d
SHA25614d06b9ba7b2efc00133c296e3278b2eef528e98f52210bfd348d846e2ef19af
SHA512604826bea349426ebf5609e247f91af343a8e38007706534d2ed185c8b86cb9a4ded9c380c0d062c8b2e72ad62bc4b023f9ff888391c6ca7e53dff714c32ad7b
-
Filesize
5KB
MD5f44bf6c33a90bd52746e7c03c2162fd2
SHA13b1e7c3b69135327fc71678d6b63742c7db2de17
SHA2566221367679678c95007101d9f496db2f97d4503cb17f01bac1c45abe1e47571b
SHA5129fffd09bd6b8050cf831fa0988cd53af48ad69e951beaf74310d84a0f39be5cfa4b95ebd1069e3958e71742fc0a00bdca3c155ef4e53004e86584ce0321d8ec5
-
Filesize
101KB
MD571eefdcec17af31eab1fe891e0bfac63
SHA100a04ad687fc33774fb4c1d41bda9a81f3cc894b
SHA2561e313e360fd3b14cdd336abdbec814dc64271c151e0de5b72cb0ed47e0d86af2
SHA512f1f27b8372ddd1ba30b8bd1ad9e0ccc268014a8aeeb4bf5e2c0aa1bc08c6e124a8b357f77f251700c7105213bea7f31243d8786e5df386fab2c815b823c8cddc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd