Analysis
-
max time kernel
82s -
max time network
85s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 11:50
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-5c4a75580fc54734a61f3f4f976354b2.r2.dev/indexx.html#[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://pub-5c4a75580fc54734a61f3f4f976354b2.r2.dev/indexx.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133409802511035704" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3884 wrote to memory of 1292 3884 chrome.exe 33 PID 3884 wrote to memory of 1292 3884 chrome.exe 33 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 5056 3884 chrome.exe 87 PID 3884 wrote to memory of 4100 3884 chrome.exe 88 PID 3884 wrote to memory of 4100 3884 chrome.exe 88 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89 PID 3884 wrote to memory of 1564 3884 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-5c4a75580fc54734a61f3f4f976354b2.r2.dev/indexx.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc30129758,0x7ffc30129768,0x7ffc301297782⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:22⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1832,i,8303565057409725946,5917653327350800104,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5a22a224bac825a685d4c38090f94bb0b
SHA12aefc15a6d06d6fa8112732b43a698ee7782dcc1
SHA256ae21a57e82e3c08d710b1565790ecaf5033eb20b1484e89bf9e9fced31e9f094
SHA5122367ca5ddb8b5665f51c21aaa1b8d9f90b8a8157178bba4dafe9273992579d9e89904f0ba0afe333464072d0467d89df20866d28337e33b08331b9c8b96d917c
-
Filesize
3KB
MD5c9f2501932407cfb3ffed01a4e1a6b51
SHA1462226ae9e081ec0a005282758793598b1dfb8f4
SHA25672ae18bb02537677d58746c395054b8282c1457d5e41324f116b901baf468898
SHA51232ed4cfa14ccbfcaff06ce3fa0d3676a0141703dd9a9ddc307c3e5e0f5bbc72e3e412de7dc09a600c9fbde921ddbc9c610773ecf1ebc6324bdc2d75b3a941341
-
Filesize
1KB
MD59bf8dc801a07b05200b48a76480b46bd
SHA104c6453bfbb6914fec2ec8b4fcd4c5980997bb9c
SHA25627b1322eb946822774b3fe4a19fe321abb72d25d46ac86025c25b62aa5c9a902
SHA512d18e2042237674228c4d1964a48019a5d9a2919f30472cb3b7e96900f71400d94c9fd38bd6143c2a18a0aea70440e5c6b4d645a87b3bd106b42171177aafefc6
-
Filesize
6KB
MD50f4db0bf77876916e8a723d5166be2f8
SHA15478da792ba576332708fce6dd13a265cd53879e
SHA25663ba31c5f12fb4cc9cef1ed124aced5eead65d3a9013df0dad777ab270573ba2
SHA5127a52418229268722558a6af23c6694c66b3462d143a92d3c652de87d5dab40e25504dce5f626cb54aa859e55a725571bdc5d33ac5408655b67eb3fd160cd1acc
-
Filesize
101KB
MD560b34d19b62844ffc914be1723d16a9a
SHA1b3d235002218a1788e930ce6eab699fa9eeb24e9
SHA256bc7d2d864b027909cedbe6bf1878e8dac20f407e723b93d1e068662d161b6ae8
SHA512875d100e383c5a5a955a6a3a00012454d544d1a27df0463e7b4e8797b0cec56546e7be3996bb95a2d9f09eec1cf4219389abda42306ab61b121cd5602106206c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd