Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 10:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://snooplyrics.com
Resource
win10v2004-20230915-en
General
-
Target
http://snooplyrics.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415815235643673" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4960 4776 chrome.exe 82 PID 4776 wrote to memory of 4960 4776 chrome.exe 82 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 2036 4776 chrome.exe 85 PID 4776 wrote to memory of 4556 4776 chrome.exe 86 PID 4776 wrote to memory of 4556 4776 chrome.exe 86 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87 PID 4776 wrote to memory of 2028 4776 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://snooplyrics.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc22209758,0x7ffc22209768,0x7ffc222097782⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:22⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4388 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:82⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=980 --field-trial-handle=1980,i,15190987347367601768,9908536407016486756,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD54f9ae45e27d09bb3fd726afde5ffaddb
SHA1ad3fb491a0a479330a251b6dc3a1888fa27d0397
SHA256675fc174a8061cdf5f015962ea9bc50697adbca8187b8f918da54525e8bb14f5
SHA5121ab05835381161d2ca211166f0704098bc549da0693bfa52d981da1e46468d90532f2f41ee44592a83bb7a8f83844f2a872f57f7f52d4b6e80c6b1b75e6695e3
-
Filesize
2KB
MD506a45aab66a954657655694c4b67eb02
SHA13bbd7dffeadcf489fa75279a41c5b30c8eaba1f6
SHA256bf1ef5470a06ed5a76f310eec7cbcc7a7a6a4c03c6fbf5939d165a28d13b7fdb
SHA51204da6a54193140753bd3c2feabe8b840d8d667474fb476cc543194a823e9973136fcdadf42c07bbc9c404dec270331f2a02c000df44aa03c4517ce6c115c7ac5
-
Filesize
1KB
MD550376c3abf6eaa8045748d143cd3b633
SHA13db7261c75e71e3a17330e42a2d44f4bde08ab6d
SHA25633fcf9816c150ed8af208b71ef62ee7ab0518908363f2a4f48a4bf5516ba1191
SHA512b432e7627607e50aa24b0974de47417dd10d8c189f7003ac9837c8054ecf2742ade4e2952f20d425724d071df3262d212faa919a056a1ea41dab4d248b3656aa
-
Filesize
535B
MD560af73ed5d5bf9e7a157ad67420eb7e6
SHA1c9acd7c7d79d1078f674141362c910df38ff7969
SHA25633da7a8bc17ec831bc7fffff9ee7d455f6862dbba40b5c3df75f9da90cfd66d4
SHA512a6e47f9de058874911699d5d422e29f05da227bf0e23ba8437c855273c0bcbd86f4bb6b549efe70044d767fe1544ceccd3acc1c479f917ce00809a353fae0ac7
-
Filesize
5KB
MD58bf0eb5b38ecf9b0a2dfcd43ef5495e6
SHA13af4a121e9d45c9e8bd5d195a11a25f2e7078361
SHA25627319ea5520ae26ceabcc36f23bf892815dcc28665c49cf302f2878864ee6f21
SHA51235132991a03194ed5e59657412715bdae54defbcc3db882e54fbe462b1e8ebc1a2f32a5f243b1249991bf8649aaf5fa53882980db4b03676c47100846f5166b3
-
Filesize
6KB
MD5dabdba4d278d985fdf3da10ec09aaedb
SHA10d438a6426072cd1fc4d1f5feb33685d46402864
SHA25691f3f48a905568131f3df3b11f310bb88a61caa2ade0d9d8f6e51a5caf111f66
SHA512cdae658c73763fb1c32a7b8323ceca52125415f8f7b39b3de00d154763c367edc4dfb6b700b753bc5e41e3e674ea5819e07c0de745201c6b4a7e408cc196fa73
-
Filesize
5KB
MD54209cd266a531b48a5b3d97cea752ca6
SHA1becf28fea7affad0cb863e101d0fa7cf90abb03b
SHA25612189448c3b867e0a944626ae7b53cc21f322eef6f20a350c38eaf12f57ec10c
SHA512c8eafb01c73e6f1374edacc276c9b28e99cf1cc23517db4dc97e0bdd7e34a5ff00902acfe0ca077690d69bb7a6215982fc5a85225af2be1ff7bbb117b91c1860
-
Filesize
103KB
MD557f530ae2664e774ed898e3c7df4e01c
SHA15f26fbe4e936813bb6e87480a9ca5c3c6264c9a7
SHA25654e190b7b444d96e78ae5b7d179d1f3b4a7c1004eaf8230f7230192eef05e6bc
SHA512974fc99397a4898bb6bf1a9ca63988c8c53b634fb28ebc42a4c93c49cb83298c1657c9bddbe3864f4ef078fbf19137a6f61940be0b7002588421ffe6db8b39ab
-
Filesize
104KB
MD5d328b5b45c3c99a1bd6c303f55f7e02c
SHA19f415d4f11f1082a59e0ef3e1c36e0c7453091bc
SHA256f12f246436dd67e19fc0be586e07d5c563fa82f43aa412cf223a66cbb045c261
SHA512113076ab15321a7a93561291c58f354d204d6af71db42ae785f156197f7882f6ed0f0a39979d5b3599e8379c972f182a24fde1deae45bc92b37736fcf76b9a90
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd