Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 10:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ugluu.mn
Resource
win10v2004-20231020-en
General
-
Target
http://ugluu.mn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 1440 chrome.exe 1440 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4000 2232 chrome.exe 48 PID 2232 wrote to memory of 4000 2232 chrome.exe 48 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3208 2232 chrome.exe 87 PID 2232 wrote to memory of 3896 2232 chrome.exe 88 PID 2232 wrote to memory of 3896 2232 chrome.exe 88 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89 PID 2232 wrote to memory of 2468 2232 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ugluu.mn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ecaf9758,0x7ff9ecaf9768,0x7ff9ecaf97782⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:22⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:82⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4860 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 --field-trial-handle=1872,i,5149221181773922762,14430214190849590446,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD516190459f9ba6095aa9627171a8ec9f4
SHA192bc0f9ce21dcc8c8a6f0fdc7601f77d3340e6fb
SHA25695e9d1d23e8c82f92468164f6708f330d648228b8e0f6c232b42e2bc3fd48040
SHA5121ec4f19d15ee405e5548fbf3fa7c673dc6de74b1800a9af233f92ffc25647246b17def4b94eff32c876691830ae31d343d79755243aeffff0acbd0dfbd6e1338
-
Filesize
3KB
MD56c3ef8b434bea8da65ffe609c3a42fc5
SHA19944beeeeb53eb24c5145adcd8fd4e11aca753b4
SHA256b94c5a5a92c4200d8c98b241aa1997cc3758864cd9d9fddb2a2646487a349e79
SHA512045e830e0edccd23b0aac70bc2b993ff99fa9b30badd25766823b8e00d2bdadaed6e04513d4fc113c1b0fd1b9f90ef2d485ad6c0168f393b91b08061c767c9f9
-
Filesize
1KB
MD584e50ec247e5f945518ce5a5b888b4a9
SHA12c0fd0525ac2615aaf7a0e317061d8ed6be267e7
SHA25601bcd56736932a9dfe17d289c5148a280cbaf1529e70c6fc586cc477d24aa590
SHA51294e60a16ec39dab1af75da404270181dbc124d168b47c29270ad5f835503701824c832d1bbfb4f1b95c0b1c6e264d60595b4658f205f92516b541248ff43da7e
-
Filesize
1KB
MD5325681dea3b2122b69a396def7bcc543
SHA15bc2ff03f5a68b2225ce062403dba281d0df0421
SHA256b67f29590fbffcac0ba22c4476c822fe4a977543b893963c4d6716a3ce026fc1
SHA5122854031558790e3739882441d68dd24981b6621ac29eafa6801376a2402669c544ceb932513839254e42650927c381d4f7744856ae09fab66db0dccfcffb7225
-
Filesize
6KB
MD50645a2a2a215effd082fabce3aa5ee06
SHA1db026899ffd22e07d4a28a0cd8d50908a8aa7683
SHA2564c79da0634da3ae90a2c88b151ba96ff3b7c85df3c95156beee8711628bbcaf4
SHA512f12fe0a2bb352c7b74e65aeab417876babaf3dc41dd16a730a658eebdce519dd7d2026015641f74a64b6ba14ef9f56f99fef59be1f8fbbc5e297ea6cc62a2855
-
Filesize
109KB
MD5a48775fa3b5b28dbe9d7dea576ef693c
SHA1de0b57ac2711686d587e7981707396e276fe2c37
SHA2564e58904f012fdcb5a842d12c038db1e424eaefa97017dfa74ad20c9dd951e61b
SHA512a7852f5c747d5caa53ff6622f4b84d313d1113a32c0c8438b7f2a1a271bd7db0adef288e8463bcfa0f9ff0779639c7054523120cf4911d8b98aff0a443864683
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd