Analysis
-
max time kernel
71s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 01:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://yzbq6xif.highteainthebath.com/
Resource
win10v2004-20230915-en
General
-
Target
http://yzbq6xif.highteainthebath.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416353208297185" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2208 2596 chrome.exe 33 PID 2596 wrote to memory of 2208 2596 chrome.exe 33 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 220 2596 chrome.exe 88 PID 2596 wrote to memory of 1456 2596 chrome.exe 89 PID 2596 wrote to memory of 1456 2596 chrome.exe 89 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90 PID 2596 wrote to memory of 3440 2596 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://yzbq6xif.highteainthebath.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffddca9758,0x7fffddca9768,0x7fffddca97782⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:22⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:12⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4876 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5408 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:12⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4984 --field-trial-handle=1872,i,16378312505788187271,6213336771301397063,131072 /prefetch:12⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD57f529c2ef4e90c2fe7b09ada4f85f4f1
SHA158b9e4de7b4a1e549a17cb471541ed330a61781b
SHA2562ebaeac31ed41fbe24fc07bc3b0fb4043422a790e356a5f38c82b125e3451827
SHA512bcf6ee7711e5dbf1943dcd133e675006d574e3959761cb1007e69b8299c5d3a8435324427b402f65b0feb3374b625e2959fcb321b67ddbaae36c5ffcb74dcd0e
-
Filesize
168B
MD5021db50a3678eec5c103ec73dcd80d61
SHA190dbe1220f581b4ad4c1fdfba1b00174b347ea72
SHA2568a37f75392dbfa45251b1365e453af7c4d5c05839e54227fd71d0f1adf423cc4
SHA51299d38802184b26740fec7bba889b14deee7e16485ff3f451c3127e4f3edad0097e996e4fce4b9431778775ef0a50e20fb3cfe8cd9628241677bab1b52752f9ef
-
Filesize
1KB
MD5775577f99f6e243164b4e5dc42f5cb50
SHA1b53e1229b31a87b5cfd1deaaf6699dbbcc8b2d26
SHA25622aa3dfdffadbbb3f2e77940c5b609c32b01cdca9f71895a0b1f88be14324c19
SHA512c7839c31fe2f70738566fb34944a1a99702ccc3abeff00364f67296e5db764885da4082ee5fb23bc283e35a082e8e03614bad846ee61dc0b9ab0f332e377d1d0
-
Filesize
539B
MD56126aa1d4a6613df356158104a1976a7
SHA1ec8349e2a45148b8c6a22b158d2211fec7dcbdf3
SHA2562b3dc3475c9fbf4f98c94c4b528f2626f75b6fd2d534879722e3e2ad9fdeb88a
SHA51255420ce92d3f145b9d070902cf96b859c5db3dee36eb000b29c46b1d21b10f07dd4b59610a7c061d5ba99953a75211de4bf7aec1f8e4a78d653ba5a539ee58a1
-
Filesize
6KB
MD52702d93f65f1d105e16e0d2d8c672d2b
SHA1ef8cc5f75657039fbe5d7bf51c887c66ced665cf
SHA256486027f20189d4649a8030dc38d5beaeb7d59cdbe8ea76821aee0bfaa87cac77
SHA51235f340f5fa86d6407ac36b531d8ab982804826d4c0343965e9b7174017c50f7a4059324354485b9de8c68008af7a301466cfb43253dd62ac3d1ab3592d7b7785
-
Filesize
101KB
MD5ba058e5ba8b82409890ac54c4067cc35
SHA10b9c917ad87360a71b01c126aef950efc33720da
SHA256c7b3dec05b313053f88a77585703bdad30b64c034df2abe411985eed1d259848
SHA512bc58b9436e9ababe5f56d3004624a6c17b36914ea522869ef07cfad4fb7c8e7ade72fd99f86a44beac45f4b647cafdf94a5ec8c37c64a7ada5150a660e836df9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd