Analysis
-
max time kernel
300s -
max time network
266s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 03:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://plb-staking.testnet.powerledger.io
Resource
win10v2004-20231020-en
General
-
Target
http://plb-staking.testnet.powerledger.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425052080682876" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 4140 chrome.exe 4140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4844 2976 chrome.exe 30 PID 2976 wrote to memory of 4844 2976 chrome.exe 30 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 5080 2976 chrome.exe 84 PID 2976 wrote to memory of 1308 2976 chrome.exe 85 PID 2976 wrote to memory of 1308 2976 chrome.exe 85 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86 PID 2976 wrote to memory of 3076 2976 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://plb-staking.testnet.powerledger.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff809db9758,0x7ff809db9768,0x7ff809db97782⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:22⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:82⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4552 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3948 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:82⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3888 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3948 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1712 --field-trial-handle=1924,i,5744443617192402761,5689754059782284109,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5318d3a99544c264c5ac0e2f9912fd72e
SHA122e4338550efc8944ce179a9c6c84d8018edf916
SHA256b5d755b56c519e1b9947b16fd15ee9abae9ac62f422106bcdbb6241630c3b33f
SHA512bd03a7df56102550b956f4e5ac3dcd2cb45fe330543fb6cc901c9222dfb0246b496af308fcf70351340920bbf6dfda21762b5ecdc3bac796a1f8913f917e53a1
-
Filesize
5KB
MD549fdd09e50d6f5f301d4f3427b74c3c4
SHA1a5609405a421636549ef4647aebaa52f129d5c51
SHA2569e37b70ae6561e4ec1ca2ce0180deb9e0e120fd838b10c3b604d3db2cc02946d
SHA51228a2fd21894dfd7bc75d8e50592e48fb13f186a4a34a268780cd2ad2b543a1e74ce7115d18835cbbdb39ce748e2f6b3f424bc3b0bd6de0d88966ab77d1339aa9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bc8de539-87db-4707-b400-7e149480b4bb.tmp
Filesize5KB
MD50734f8d1ce1477e96712f35901a25c1b
SHA1ee2b4d23b5c03981837c8990f04b4678698bff11
SHA256193f7bfb69ee08201ca2b179f47eb278622143e208bf7d541ae1d5474f2aa832
SHA512d46da70bcc9666721e60d3b5c63b873365391a7bf5623aa43a9b8b292a4d8fef0473a36fd37492c96cd5d05578dff51165160305a4f9e824e0d35df47ca161fb
-
Filesize
109KB
MD5786aab22d1e71a86956b5fa3983a7118
SHA10dd95cf5cb7dadf810ded9664b47592b386b80bb
SHA256ea72c71f40dd2c68ba3ae92bb9b1e2c62fb36dcd75b540a2f6489a5481291276
SHA51287116402ef49d697154cadeb718fa9f4cd311ebeca5ffca1d9fafbb33cffeb8ff4c1dc8ab57a5b4419b53f061673a7ee70798cedacc02fef9887abb683004eb3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd