Analysis
-
max time kernel
311s -
max time network
310s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 21:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://heylitimysun.top
Resource
win10v2004-20230915-en
General
-
Target
http://heylitimysun.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133414488320198450" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 1812 chrome.exe 1812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4416 4480 chrome.exe 15 PID 4480 wrote to memory of 4416 4480 chrome.exe 15 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 4500 4480 chrome.exe 37 PID 4480 wrote to memory of 1340 4480 chrome.exe 36 PID 4480 wrote to memory of 1340 4480 chrome.exe 36 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32 PID 4480 wrote to memory of 2388 4480 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://heylitimysun.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe83ed9758,0x7ffe83ed9768,0x7ffe83ed97782⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=424 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:22⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4680 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3452 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5644 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5880 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5748 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4540 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3764 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5968 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3912 --field-trial-handle=1896,i,11935828579594295610,7507594886321361072,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD53563c4303816f4e436bb361f83876ecf
SHA146523258cb4a527d719f33f30883d5fb5085ade9
SHA256915da23e77537ea6ca3953d732184f68c542dbdb2ec84d28b946a0886418d77a
SHA5127a485da026462d0d13e1bc46447c0d6c7ad4feaeeaee66aabbbe6cb62cc1eb7292796ce7bba406673d8603732bab1fb8e7caa48e2c631da4332f1ba2ed25b73c
-
Filesize
6KB
MD59f4e98e15139ff41e58073559315b8b7
SHA1909c618cefc49a644595737334233381e9accee3
SHA256b573ef181aa0ebd915f14b8084ff6a3eb0636391084249e4fb5e6907dce997e5
SHA5129a66f3d9826a7f08dda98e0e779d06d397721eb759954e0f62949c610ac79ba85d045922c3fd96582f9bea0f1b31bc7729e1ef32e4abbaed61d1016bd0ee3405
-
Filesize
6KB
MD53b1bc112f08e63353ff1b49050a9c277
SHA1ade0a259761c4eebe6ca08dab73278df4e7abe6c
SHA256d7c26711d49c0de174cbfa885a1c728b2b7d057624b27c3851aed5b1d76dae9c
SHA5127dc15bb4cf9c7242cb089e4570836b91c9a2868011cefd57e4fe6a806a99e1a31828ab7ba8a8a0ed32cd1a75156ce837137ec95442aabbd3b03f48860cff5306
-
Filesize
101KB
MD5961390af5879be11fb49a9029f9e6ced
SHA15b888472ca90a4dfddfbba5776e45c5d361a837a
SHA256387daab0da2adda8714715430a3114122eae6ed44f6b4464f2823d903615aba6
SHA512ee0644b291585a61490e32c519979e79f46009797352b505ab260ee453c2e2f8f5a5824ee35c8c90cb0349cd6cd423e988a56c408a9c6407e9a0e22bc537bcf3