Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://c.ekstatic.net/adrum-xd.84f248a459170522583669996382bd82.html
Resource
win10v2004-20230915-en
General
-
Target
https://c.ekstatic.net/adrum-xd.84f248a459170522583669996382bd82.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415765981445242" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 2372 3780 chrome.exe 86 PID 3780 wrote to memory of 2372 3780 chrome.exe 86 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 3124 3780 chrome.exe 88 PID 3780 wrote to memory of 4748 3780 chrome.exe 90 PID 3780 wrote to memory of 4748 3780 chrome.exe 90 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89 PID 3780 wrote to memory of 3696 3780 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://c.ekstatic.net/adrum-xd.84f248a459170522583669996382bd82.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc590d9758,0x7ffc590d9768,0x7ffc590d97782⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:22⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:12⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1864,i,8733069915059303095,5783531714727885914,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c59ec28fc3950da5ef6216fd3fb3d46
SHA13447d94273fc1c3d6006eb2560336e59cb277154
SHA256ae9d1a0cfdc49ef16afb08045a3e53e4be71ddac534d556665574499f4bfd195
SHA51229e6822e0a4ebea97c764f1a178ad50926f6dc93726050efac07de193314c294aa56a1614b18f28cf125b677d5bb198527bd4a3968e76fa69b9c43abe36f0a23
-
Filesize
538B
MD553d512add6b1bac512dbba9dd92a5d4e
SHA1bef7c641f5de0703748e79dd1b07ffb4f5b8db0e
SHA25632c5089e3a770fd97071514c0e883d0ccbcb08d5d9f5320fcff40a0a8ef7e118
SHA51230a35027dc80f9371e5a67a5b5edc14bf5b601854adbd0a3ff512bd9338a6c2d4965a787a67244d2038029fe695bb796ad783a0a383d99f317740c25c396b7a5
-
Filesize
6KB
MD573dfb3a6fd316264f6f47293ac11a9fd
SHA121c58b501e358b4a36ff956ce61c240b4328be2b
SHA2562be773bbaeaadd3a225ed277d5e201baba870173bc1057642425a765b025698d
SHA512d69f865c26496301d09b7c15953577d2c7de213727d2570f08af1bc59121fea4620e2a1a7f13f3a569affa19b6d0d8d674662daea5fcfbff72704e1cc2315e10
-
Filesize
6KB
MD5c19b5ab126dff8edceac473c3316278f
SHA1b13cbef6317a61e5f137e7de425401a62dc6cfff
SHA256c533819f0e6011be93b82332f7cf62551825822415dbc4b725f70e9fd19a3030
SHA512a453ad6b79bb8a93e726098c12b727a485a9f67d355b2e70dcefaf9fef7ca4174cdc3893517fc4d1e05b3ea2dbbe9d89dc54f2145e16f927f88d1103024091ff
-
Filesize
101KB
MD597891b02793f64ac6b273f496ab8b95a
SHA15e62ef5a6a8a39c399f1169ccd2d8a8334bf099c
SHA256f6152afd5d2e30741da033f8ed93faa6dd9d346d352bd2ed59134653b70507fe
SHA5125fe5e30e0cd2249644f71baeee7f655615c978d531f489f40738b4d61557b59749d9d792215d03b776103ef95a84d83e617df7201664e7d45776d8489842f470
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd