Resubmissions
13-10-2023 13:10
231013-qemzyaaa2y 1Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
13-10-2023 13:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://slfckr.com
Resource
win10-20230915-en
General
-
Target
https://slfckr.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416762945379427" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 344 chrome.exe 344 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 344 chrome.exe 344 chrome.exe 344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: 33 3252 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3252 AUDIODG.EXE Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 344 wrote to memory of 3652 344 chrome.exe chrome.exe PID 344 wrote to memory of 3652 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 3356 344 chrome.exe chrome.exe PID 344 wrote to memory of 2396 344 chrome.exe chrome.exe PID 344 wrote to memory of 2396 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe PID 344 wrote to memory of 1840 344 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://slfckr.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb2fab9758,0x7ffb2fab9768,0x7ffb2fab97782⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:22⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5084 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 --field-trial-handle=1732,i,13746253848847712479,17771386904364785348,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD5db2830901e9d7860741c15254486d394
SHA152c85f3f5fbe0df7332cb232c2d71c598a5cc22c
SHA2560abc4db458ca82eae61fbb32dbd6721dc124f069ae5d1ea6b6057f58c4dba634
SHA5123381d184358bbb6ed057b8e187dba046805411ce6306240136320c86147de9173e0c151176c3c92f2311f5402439eb1ebfc2a253c33848cd39ea58a36b0c430d
-
Filesize
1KB
MD5e2766161c9ad54355a351b6df841ccf3
SHA158d6ad7ee7dc8c2da759ecb1612cae3018bd3258
SHA256883d4a41b0a8f6b4c71f4591b1106d7a2057b98307fb538c15309c59ab36aefd
SHA512247b07b894762b5fbfac489586b5704a8fdffda33a10ca07ff2ea7dbd7adfd3b263c403ac9171c508054e83fc566d1952d98b971f1c90c36c65f7a510a69e532
-
Filesize
5KB
MD5ba48787231a5ed20dbda3694d61c7371
SHA108cc8c3d6096b1058c6009adfeb1323c7027ddb6
SHA256ce5ed0c6cbf1a681d5fc19fbe6f83107c7802e9f1a06baec811f846741f23fe8
SHA51216c8e27c04ba8a7f73ffab39a64cf9eafeb78cd376abffe0f32cdb9356d12e9740b736c2eeb67b3f96a681556fc6d1c01530f85feb0bf036bf347111caaf5f74
-
Filesize
6KB
MD544b4a9aba4190659dc9a40b0b67ee545
SHA1ad51cabf2012ed4b4ec879e9595cefbd9507faee
SHA2560a1a2344f47685cf8fc0f92d278fbe5da5ec6c464bba92df4e35848c2636c26a
SHA512706084a83fa3b8449b34959df1424e33f796e559146313be7dc360a70c6402426ba007f26a25efc05ab89f0cdaa0dde651f83bd9dad3df3aab1199205f79084d
-
Filesize
6KB
MD51fae9b502f8ba2a8aadb1ac7121fbe41
SHA1a013d0873ccd7d58c96445d7ae0bd156ac321736
SHA256da60482e7124b738eb1d78666d311e2af3f16f7aad3c96a2ed6fd00b18ff5e3c
SHA512966fdbf97024b13ece16b85d4730a3a1dd296498ca8616640de7e7f5c1907e6dba6fbafedde8359eb7b358451cc53aa3f0856ddf893756b2d3d6482dbfbe34f1
-
Filesize
6KB
MD5aed877bd064e067a4daaa8d149ceb49a
SHA1f1a924b90e04bf46a61dbc7cd178a1fd92a96e34
SHA2563c4a860d74f1e40ca8d11b3403ddff24e5ce48ab747699cab07321c7d8563137
SHA5124989f0a87a65e588619e3afaa303323c57183266bb225c5f49c0605a990f4fd19dc8470341c5e37f044ec920d13b4c811b7cfe333a651f601c00f764c1a06305
-
Filesize
101KB
MD58ea6e76cf4531e7c7c33b5da31f89651
SHA1be6b1aec27cfdef47c676f949bcee1600ffcad10
SHA256129c7afafedbe25842c5cc998fc07b336d47b5c72f7a18e96114f04c3fc25eb4
SHA51219aae74c16fe11ed26a1e6c6bd3fe7d324376915cd2be9498c99d36ec72b9ba7dfa417f6774fe0d94c534751f72bc646464cc1948ee6bc19c37d0a863e98a375
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e