Analysis
-
max time kernel
12s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 06:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wnt-some-psh.com
Resource
win10v2004-20230915-en
General
-
Target
http://wnt-some-psh.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410467438051480" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4708 2760 chrome.exe 78 PID 2760 wrote to memory of 4708 2760 chrome.exe 78 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 1092 2760 chrome.exe 85 PID 2760 wrote to memory of 812 2760 chrome.exe 86 PID 2760 wrote to memory of 812 2760 chrome.exe 86 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87 PID 2760 wrote to memory of 4500 2760 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://wnt-some-psh.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffe74439758,0x7ffe74439768,0x7ffe744397782⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:22⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:82⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:12⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1864,i,13922465518719169720,5275383063122579955,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5db89d5998b8ab348a22ed7af1dcc057d
SHA1276ab59b1fc98d4bc2ff8f9df040895893d9b440
SHA256002708012d10cd0ec238aa18568ee5c2481de53fe33e7a8cb1214eb76cb7b07d
SHA51240e7e2154f50e7ff6d7ad8f999e9deb57946edf111b37f3d488615a4619c49e0ef315ea9e17d7305be2756d91b6c7117104597e57caa1a80db5f16cde873c6dd
-
Filesize
103KB
MD558f22b3dc7f47928547c552dd0107b3c
SHA1e7a6a9a97b6815f661db22d1d8f29e8ffc0f54b2
SHA2562bf0b3d2934c538d4cd46cd6d8d53b84372d3fc0f708b445a862b110fc6e1342
SHA5121848eb2fa905501a16a73d5ea233a4e09d3c0ef13e323416cd2af294e5f39909d7425cb7f5cdae74a16f6725958636a7d6e660e43405a7ea2e6b2f461c4cac57
-
Filesize
104KB
MD57496e53400ff68f34a11a830f68c152c
SHA184a2e777273109afbc6db0b0c13f78f93f8849be
SHA2566162bd63a5d8c5a905c7a6226766c907ac643627e9793c60a19c88b96c089011
SHA512942456cb8837234028cf546e7a90d0d334790e160a97caa96cde68cd7c9d420570bc1aaf42f1aaf8084ba87f68a987ea2c9415589bd669836eba6434b629cd37
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd