Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 00:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dist-ed536.web.app
Resource
win10v2004-20230915-en
General
-
Target
https://dist-ed536.web.app
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 api.db-ip.com 28 api.db-ip.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410257690553573" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 3788 chrome.exe 3788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeCreatePagefilePrivilege 1988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1620 1988 chrome.exe 42 PID 1988 wrote to memory of 1620 1988 chrome.exe 42 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 2540 1988 chrome.exe 90 PID 1988 wrote to memory of 956 1988 chrome.exe 91 PID 1988 wrote to memory of 956 1988 chrome.exe 91 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94 PID 1988 wrote to memory of 3752 1988 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dist-ed536.web.app1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb36b29758,0x7ffb36b29768,0x7ffb36b297782⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:22⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3796 --field-trial-handle=1860,i,5018533177720114477,3368309664572178572,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD59d97d22fae240a3a6c6cbe0f31734735
SHA157d5aaf6792a40a76800463791f2df93103e6783
SHA25697e2f9780f9ce89986502292d16125b1eb710687273dba18620faf02f71f9ad4
SHA512599b831b08cacb7820441d075610467155a51ffc9f364eaa213150542c8049476fe391bb02265eec14f659df4fb13bfae3f7969b08643155b3fe5114806b5324
-
Filesize
2KB
MD581a11c801f0e390c36c8c4fdd10206d1
SHA1e93f9fa818f3b1b2ae3bbca8a62e28de8ab1bfe5
SHA256b096f3d0ac5e634d1ba12e2ff376b248c6538431385b417d4a56bfedd6f6effa
SHA51227333b13126321b48bae3344522941ec4b6377db89dfb0556c35cc0b3b29a8b3e4011122d472bf2b70dd02a918534f2f73635882754aacc3f0ed63d5de10196f
-
Filesize
706B
MD5b42a2d894d05ff1e983cb26576c82d4b
SHA1ac9c0a918ef86686396271202c38eaf3af44ee0a
SHA2568d833d4af7a299e55db91eb9a85d7655dd61f39450a27d78ae5ff9db94178097
SHA512259d872e870281c23b57dbe610d6dad85655c660a3e9ba99c8d7ad12e2cce06c068b9b3b96160af88d5db0ba30180b4926ae56692b567b1b18c942d981c3efc3
-
Filesize
6KB
MD54b01735c9c4b60e98bf8fdf7c45a33dd
SHA127e4415b893bc277b3ae91f0084f4d5d4644096c
SHA2565bf38c4187790bca370384e15593f0d1b71a7011f9cddecaba1a68d9ff4d4a8f
SHA512b71e8fc7e32f33b8fbe8e1532b150dd08830ba428c36649458ed3b4db9d0d1980277ca3edba993134786fa9d885555a66324de57c4ba8c1f8948425c0a91c999
-
Filesize
101KB
MD557792401c57450443aace48f4f3dc5e2
SHA1e44866449f17eede164e5a169f81c07e7becf3e1
SHA2561101af173eec7d188cd224df422c7c9f4bf22d3b40ef73f868b57177b3974110
SHA512669beccf9c6c5545c99fdafffacb548ad3a6e644808cdc451fe4ee1a749511b3dd83d3ce40466ce1d6ffd6d62f9e229af758b7c489f5df222d71ba2de2fb3201
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd