Analysis
-
max time kernel
163s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 13:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.sidekickopen26.com/Ctc/DM+23284/cSrjB04/Jks2-6qcW69sMD-6lZ3lnW87Y8XP4Kk2YtW85k9jy75BMJCVlBC283jm6NHW3JpLNZ8nXtYfW5JhbQY2x_9MZVVrLsp4D3z6LV482ZD18-HXjW54R9dB4dhD0kW66cBQ51CF2vzW91fpGN3GK5l7W7cLCR67tcSv7W6km5dm3-SJZRN1mkLtNmg7T4W7g3Csq8qKTKpW2LcYX76Kv9ZKW6JNw0M2vtbYKW4P-Dcs4kfHTlW1j69WW1_D0jFW7xc_mT8dbxsFW4kqL_45KW7vmf33cMDl04
Resource
win10v2004-20230915-en
General
-
Target
https://t.sidekickopen26.com/Ctc/DM+23284/cSrjB04/Jks2-6qcW69sMD-6lZ3lnW87Y8XP4Kk2YtW85k9jy75BMJCVlBC283jm6NHW3JpLNZ8nXtYfW5JhbQY2x_9MZVVrLsp4D3z6LV482ZD18-HXjW54R9dB4dhD0kW66cBQ51CF2vzW91fpGN3GK5l7W7cLCR67tcSv7W6km5dm3-SJZRN1mkLtNmg7T4W7g3Csq8qKTKpW2LcYX76Kv9ZKW6JNw0M2vtbYKW4P-Dcs4kfHTlW1j69WW1_D0jFW7xc_mT8dbxsFW4kqL_45KW7vmf33cMDl04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133414180800255504" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4392 4148 chrome.exe 35 PID 4148 wrote to memory of 4392 4148 chrome.exe 35 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 4456 4148 chrome.exe 88 PID 4148 wrote to memory of 5040 4148 chrome.exe 89 PID 4148 wrote to memory of 5040 4148 chrome.exe 89 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90 PID 4148 wrote to memory of 4796 4148 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.sidekickopen26.com/Ctc/DM+23284/cSrjB04/Jks2-6qcW69sMD-6lZ3lnW87Y8XP4Kk2YtW85k9jy75BMJCVlBC283jm6NHW3JpLNZ8nXtYfW5JhbQY2x_9MZVVrLsp4D3z6LV482ZD18-HXjW54R9dB4dhD0kW66cBQ51CF2vzW91fpGN3GK5l7W7cLCR67tcSv7W6km5dm3-SJZRN1mkLtNmg7T4W7g3Csq8qKTKpW2LcYX76Kv9ZKW6JNw0M2vtbYKW4P-Dcs4kfHTlW1j69WW1_D0jFW7xc_mT8dbxsFW4kqL_45KW7vmf33cMDl041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd30459758,0x7ffd30459768,0x7ffd304597782⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:22⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:12⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:12⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1720 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:82⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3384 --field-trial-handle=1020,i,2798524601306450542,10997502291054263028,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD5b9daf719d025442b806b108983b9ca81
SHA1e05f199dd5957c97e97ba5194924524203d00f0a
SHA2562c8a3eb82f2d0fbbd00e92b942b3c573d21f428655c5866c3b9259cc1bd1bcfa
SHA512d1de4fa9fe3a0cff6b91b42b36c34081b7d75bbd0f56369151606be2daf38e76e49de580f16f32a34eabde65e05c2abd19755a2a50cd1ee31f20ca309e527bd8
-
Filesize
4KB
MD5482781e614ad45432596b94f816a8dac
SHA1a68c377ad106d79365a795ce3b4186ce08241279
SHA25695246b92ac025ee966dec7447bc5f86bc400f3f5c589e1fb5fab7747a3a5c722
SHA512b73f97d55dfed38106a0deadc6baabeaedd550314e36a8c17fdd0c35c124aef99fd765a684e6ec8c4f2a5df851ff30a5fc4380266f1f596ee1df61440a7aca4b
-
Filesize
2KB
MD507e49de7ff036c0d7d9fbd48d8409e36
SHA13e44f534f358c3dba635ad3da627bbc97e6a8059
SHA256888ffbd24d1355ed7bf6274aef4f69f1c9f3982cb344c60ffc332195287e25e6
SHA51287b962f3cd521d6173320b0ef32051a38680a28bd595baae7f2436b27f2ca710e8889c5d14c4d368d769953e21550d78699059de653e223e01b8369eb3262a5e
-
Filesize
2KB
MD555e836e88de922e570540571f92784ef
SHA1103b6bd853d506894ee2cf46e57fbbd86a90b5d0
SHA256203e88f3cbe9fadbd362d273e0cfa96af9bf96ca16a573b0624e18849fcbef66
SHA51258696c821e9eb0568fc693d5f7e7d1b5c486f084406871fc0b677bcfcdf2f858781f45eee6fc4c74b73936e5e93a6b6678086b992f6ad5ee5dd2bfdfad16159f
-
Filesize
6KB
MD55c28a8154ee7b4f13f516ea5c430cd35
SHA193cf2a27cca041f223b0e377c4012b002ce74920
SHA256fc688bf82e4432356372dc6eb75a6004e7a7e8067f2141eb27b5622204e440d0
SHA5127b73ccef2580cd7b955f32b09145570aa2f4a6ad82deaa21c35700f19ee67eac8eb83cb346660e1129ebc0c384bd4bfe18bfbc6bab6b093d055b390fca066f19
-
Filesize
101KB
MD5bb39c651fa5d1646ce2578e16ef4939e
SHA1d82b1175afce2ea10b23fee2ebc811e75c76c9c4
SHA256ee8ec229b2437aeba7d0ff0a57336dcff284d3a9d3dac9f0b887282f9dfb214e
SHA512a8aed09396dffe34a9d5c5fc3bd8f033b77a2b14a5faa756696905a8a6f6c3b6dd5a99672d7c09582044e596dcf98c30ece116414acfa7a43bd955d3cf4f58cd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd