Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 07:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ec2-44-230-127-50.us-west-2.compute.amazonaws.com/N-6nrm2DYfOV09pXko-kJMG0IcPyn6n8EoVEju6-Lkvs4sBJohIiePK6-SmkwXKScr6FoT_RWyr783WJ-pl2z25cYuoSknhSRQMFR_b8x6Akf4g5j-1OVtbvIJB0axkfEstT3mFTqaHQYGx0DjlDcoJtf6CMDN2JdXV-jknPX5oajgm41GItR5lsQAa
Resource
win10v2004-20230915-en
General
-
Target
http://ec2-44-230-127-50.us-west-2.compute.amazonaws.com/N-6nrm2DYfOV09pXko-kJMG0IcPyn6n8EoVEju6-Lkvs4sBJohIiePK6-SmkwXKScr6FoT_RWyr783WJ-pl2z25cYuoSknhSRQMFR_b8x6Akf4g5j-1OVtbvIJB0axkfEstT3mFTqaHQYGx0DjlDcoJtf6CMDN2JdXV-jknPX5oajgm41GItR5lsQAa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413084758028760" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 1408 chrome.exe 1408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4256 4480 chrome.exe 55 PID 4480 wrote to memory of 4256 4480 chrome.exe 55 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 4628 4480 chrome.exe 87 PID 4480 wrote to memory of 2604 4480 chrome.exe 88 PID 4480 wrote to memory of 2604 4480 chrome.exe 88 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89 PID 4480 wrote to memory of 3956 4480 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ec2-44-230-127-50.us-west-2.compute.amazonaws.com/N-6nrm2DYfOV09pXko-kJMG0IcPyn6n8EoVEju6-Lkvs4sBJohIiePK6-SmkwXKScr6FoT_RWyr783WJ-pl2z25cYuoSknhSRQMFR_b8x6Akf4g5j-1OVtbvIJB0axkfEstT3mFTqaHQYGx0DjlDcoJtf6CMDN2JdXV-jknPX5oajgm41GItR5lsQAa1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa839f9758,0x7ffa839f9768,0x7ffa839f97782⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:22⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3340 --field-trial-handle=1844,i,18140941783390676822,5748868978050450274,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f7efe802d9b62b2e0b7dd72bf2c53a60
SHA18a73416ab17cfe098f01ac1760eb8d3c11c90eeb
SHA256acb3f3fb8091f88c847975498d10983c89b60b457fce265ada16ee2f7430512b
SHA5125461e79a274b343eae02697f350eb5bc55cb4f609e826553d4676ab2c9043466ec9e37c1ed309d60fa01af34027ca90b5881627f57854adeb85e90aac4de09fc
-
Filesize
6KB
MD50d9eb4149978d666e506d120db6065e8
SHA155d57e1a000b0d6e7737543ddbc458ce84b53880
SHA25688ff63defe64eacf9d3b125fc1fa069c11fe5392e805fd8d296db4d5eb6af6ca
SHA512fabc21966363bf05fcb98a2efd38313ab4201211974d193c94419728b4c0d7919d26fb72095756358da107aded10cd73819f4636618d024a0ef67cb66e4c6962
-
Filesize
101KB
MD5cd8f95321e14f92beb2bd49dbddcda2b
SHA1aa56d0be05b74bebf82fccd051894ae1dea04110
SHA25669d632d853263696106e77364ed8c319ddb6468dfd70061b31c3ef1b4d520c1b
SHA512e7f28cc56cc259171a8b00dd1774035fec9a34111242054b223110f2c3186ff4961cf2a1a22d25abcde6a17d99d7526d443d41fa586f387816cdd77bb9e7ee9e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd