Analysis
-
max time kernel
600s -
max time network
494s -
platform
windows10-1703_x64 -
resource
win10-20231020-es -
resource tags
arch:x64arch:x86image:win10-20231020-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
22/10/2023, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
ngrok.exe
Resource
win10-20231020-es
General
-
Target
ngrok.exe
-
Size
24.0MB
-
MD5
34985fae5fa8e9ebaa872de8d0105005
-
SHA1
a35c3e85ab82ed26ddbed639d16e56df0870ab6b
-
SHA256
a1a26778656c5215ab1d939ebd9088827f69923ecf53a503b04bb504fdb97752
-
SHA512
99caddbd4966ff46b54c8a5073b2634e32dba2b4b2571b217df729793d6e6f1fdfe0836fe884ccfe37b8476d8e096c3caace45dbd288c17761443a314ffe5271
-
SSDEEP
98304:0mZ7o8sLX5utFa66b+AWAmz7u4DzX/7x/tSZBxHwhrBBqVwkXglkHBx/EDGUF9QJ:PA4Fa66b+AGf/7NtSYki3F2c7OVm5G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133424647571307652" chrome.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4480 ngrok.exe 4480 ngrok.exe 4480 ngrok.exe 4480 ngrok.exe 920 ngrok.exe 920 ngrok.exe 920 ngrok.exe 920 ngrok.exe 4164 chrome.exe 4164 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 920 4480 ngrok.exe 71 PID 4480 wrote to memory of 920 4480 ngrok.exe 71 PID 4480 wrote to memory of 4600 4480 ngrok.exe 72 PID 4480 wrote to memory of 4600 4480 ngrok.exe 72 PID 4164 wrote to memory of 656 4164 chrome.exe 75 PID 4164 wrote to memory of 656 4164 chrome.exe 75 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 4632 4164 chrome.exe 79 PID 4164 wrote to memory of 1236 4164 chrome.exe 77 PID 4164 wrote to memory of 1236 4164 chrome.exe 77 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78 PID 4164 wrote to memory of 3424 4164 chrome.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\ngrok.exe"C:\Users\Admin\AppData\Local\Temp\ngrok.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\ngrok.exeC:\Users\Admin\AppData\Local\Temp\ngrok.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Windows\system32\cmd.execmd.exe /K2⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe93d99758,0x7ffe93d99768,0x7ffe93d997782⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:22⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2496 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4480 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4724 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3788 --field-trial-handle=1840,i,3228118425555466597,4219169678151970636,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57f61b28b51ddf42ae12ac6b4fcb00eac
SHA1fc5f8e45bf2fca3a77b77de4eff5982a0d540ac7
SHA256059fc7d8f35c24caba1c244a20228f68e723b337584d59eae078dbd3a942863a
SHA5123a61bffa7c08b1f7ba27a9e605733f4f7a0df69c899892d8f4210db24524795c301838e7d78959ab01e8b536d1207a1ec7afdbe9db14b378cff319784478d8cb
-
Filesize
371B
MD52c84a82ae790d3efbc8596e877bea23d
SHA172a991c328f3b30a8ddd2ca2655589bde4eda3fd
SHA25652c99222c154f69a86204777250dd78b6ebadb7dc8e1163205b702c67d9e1f1e
SHA512f702aab233f2ab5e6500547cca833b8c1f8eaade641212b5a0f9cc4b62556b4daa1b195b96c43125d62be945649bb88e983649c7dc8a2cfba4ac85549019cb59
-
Filesize
5KB
MD5fd9fbabe4d4b1fb0bbcd1d8c8d15da02
SHA16d24928ba239df990b7b2cfcde733a25d7c7519d
SHA2565353e74f1024a8aa02948bbf219f270c0378d5e8eedfa567c1be6b9a7bfe8c53
SHA5124946c4b17e4c5cccdf711382fec4ed91be820880cd2dbcf848b81e8e64b3b60bcc5d7ea23fc13a937e68fbecb7358071b27b61f4cb30429b8f65779a0d3be99e
-
Filesize
5KB
MD58148e9344dbaca77afbe26f1e4e06e63
SHA17b3c82f27c19d5291141170c332e0fab66c3a409
SHA2565babe192a97d65c72e81e6959969dfddf94a81297e4f07a1838ffb857d44a86a
SHA5129827106042aec7f6c58b33deaa047797837263adba5b15bb4bce496e5a24baf365957a02a381e95100691f0e5a208754fc1fdbce0fdfa925811482a961df0f06
-
Filesize
5KB
MD552c141fed56908cbe69f6b04e7da58e7
SHA1b01d9e68fc0c9604ffa1b1aa2e48c682fb2168c6
SHA2565371d3bdadfa23fdc86629393202e7629c49fac182e8bdad9736151f91064dc0
SHA512008e31e2d218bd6b19515fb6e6c450c1341d42b40190722c7d4b357af493e3348412f712d5b976ebe37e288270fd3cd7960cb584a053b938f14903d70e4c6fb9
-
Filesize
212KB
MD5a7b524b4bc8636e168371fded3dae9a9
SHA1e2f8efc60a7ad00a2b78d3cc5e527ef4c4166e1d
SHA256728d139535f344e3abfb5b35766ca5b5ee25dd732dafd3d374bdae2f775cb894
SHA5128c322104d6e0fbd4e4950459451af1ae34d19da6b78fd1f4f06c44a86976fa51fb06f091829b1a96badd6e74b1b7297d760a0c17a2d551d95e2fd7df2b23ba31
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd