Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 06:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://LEROYMERLINE.COM
Resource
win10v2004-20230915-en
General
-
Target
http://LEROYMERLINE.COM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416512833783715" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 844 5096 chrome.exe 86 PID 5096 wrote to memory of 844 5096 chrome.exe 86 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 4468 5096 chrome.exe 88 PID 5096 wrote to memory of 2228 5096 chrome.exe 89 PID 5096 wrote to memory of 2228 5096 chrome.exe 89 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90 PID 5096 wrote to memory of 4256 5096 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://LEROYMERLINE.COM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3cb89758,0x7ffb3cb89768,0x7ffb3cb897782⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:22⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4360 --field-trial-handle=1856,i,15029187402923143706,13515827067476570298,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5b0775bc23b911a78fc29c2c623a3a1d9
SHA10988862c44896683654f24d2e5cccd6199def29a
SHA2568788c62a08d046dc1aa07bd15525ed9cc8fcf6ed62ae6147ae27f9c4e6e0d407
SHA512fddef9ec8a6aff6bfccd33e9fee0645f3e71e8092302b342839d242423c657bf57a4e295c1db718a5ed7b971149ccbf794ebd2d20c36dc48b76e47fdccdee818
-
Filesize
5KB
MD54aaecd7f7fa9a22a8d6956f4cd26fe98
SHA10aa98e5b9b674a0ad7f77d5ab8a32e7a795637d4
SHA256eaf2cb0b5d6f7a7599cc9c5b54dd6cce93748377c4894b7898208591884c96c1
SHA512df1a110734312a8b56c8ec8f5c34b16407bfaf093e552cd4ce5b3827a71be100d85addbe0ea4871535d05c59fa7ac797dea62bb9839767a16497914e50c8329b
-
Filesize
6KB
MD59510cbc8a89e0925d560501762a8e29a
SHA1da46edccea8118999c13d8d30fcff9e2fb965eca
SHA2565ad67db950e4595d1524843d40d2ccd744d2f0212d96a115c92a1bb0e3c7ab06
SHA51214dc39a346d3bbcf0907b81591eea244ca2fd6d2b02e18241653c908d509ed301ba3744abd67b8ce228e87f36bce209cf7bbc708a403148f18133f6e7672ec67
-
Filesize
101KB
MD5dc1df53482e5fa36d260ab8c4405ccdb
SHA14c07b0c0be11b95d4044bf2d0cbacd0e0e06e1be
SHA2565ce5cb07aa87d6ef6ba81d3358895030cee1d66f1a3cb207251ad7e452e583e2
SHA512531f561460cd317bc781a0cab5aab90c3484a78fa019767d5fbcc2569d7cf79aecd4f5c2c28f06d36c298a49db8d6ad5854708430ae9a1ea2e44cd08d98d212d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd