Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 13:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://res.cloudinary.com/dyyjph6kx/image/upload/f_auto/webui/eng/xoxoday-logo.svg
Resource
win10v2004-20231020-en
General
-
Target
https://res.cloudinary.com/dyyjph6kx/image/upload/f_auto/webui/eng/xoxoday-logo.svg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425424595066833" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4556 3812 chrome.exe 33 PID 3812 wrote to memory of 4556 3812 chrome.exe 33 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 4636 3812 chrome.exe 85 PID 3812 wrote to memory of 1792 3812 chrome.exe 86 PID 3812 wrote to memory of 1792 3812 chrome.exe 86 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87 PID 3812 wrote to memory of 1136 3812 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://res.cloudinary.com/dyyjph6kx/image/upload/f_auto/webui/eng/xoxoday-logo.svg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff87e29758,0x7fff87e29768,0x7fff87e297782⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:22⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=748 --field-trial-handle=1892,i,11488757456914460657,4147577999357925689,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59dd14767b5215105035f941a50c7cf4c
SHA1ec6a2b5a6472ac717c55ff168a4ddcac2bdeedc5
SHA2569e5bccb008a3f519361977d91a20f6e55ffc53c056bcd65607dfe4ec18bef887
SHA512b389bf84ed1c028eadae20c0560f64c3d884047eb9d342e5da42f320b36f00224a7a8d8c7c5d67ee102ac65f078f08bbbad443b9fe4146dafbeab60b6dc8d48e
-
Filesize
539B
MD5f3a5c89fdd6e14c3af6b6d9e3397b47e
SHA1b2e233c4c3e59175fea4c1bffd3296ebaf104b68
SHA256464485270988903a7205d8f96aff6bbe3409d693c93c9d6b103d28c84691e932
SHA5124d0ebf4662cb90903aeeee7da3464c925382a69cab50881303d90b0d1fe11aba481d065f6da43f6ec57430a9b99e58e7e67ccde05c9bf5964e5a13ca7dac4b68
-
Filesize
6KB
MD5690cf6282e5dcbd229e6a6388cebf5d9
SHA184884f20e68636d62433dda463895d500ff133a0
SHA256e02aef578598c920700bd34062eaff348ccd7d58b8c36cc5a1c37758eb908f8a
SHA5123a65807a8cd295b061e8344e839a69b0c67ac28b4d93e8fa7bf095d04ab8b0fdcd5987d468368765964dd37aacae8584d056aed1f428c03cee7a48884a993189
-
Filesize
5KB
MD54ee5b2bbffdb7a52b9b300cc81352d1d
SHA152ce0bf3332170f8af30afdd95ffc96e95220efe
SHA256347103c1b4a4c2817f1c51bb147e131d7755baaca44d8b2ad933bf63152eaba0
SHA512d84cf60924abb2ff3e870e810dae2379f0cf2b2ee915b00977e11abfe0b03ba28444e1c80179bc0744ef7634d20c1ccda8bb8e16363094b0bc62bbc611590600
-
Filesize
5KB
MD5ad23d69e788c48113430d4e6796af5b4
SHA1b17285893be62b724334d5d3cfb42e047b55f446
SHA256d2200af0c95bbf384866937e210923fc6d17270bfd7f1498939baf755dc9ec0f
SHA512ed96896af490b69dacd83dc020092f73f8f9c9f6bbcf3384a2cd749c83565115cfcb2b497863f7eda133172f6ecb6bc88f83520d4ec9fc471ff527ab6029b6b9
-
Filesize
109KB
MD59f7d9421d0630a6ff807e4c6906cbcc5
SHA1a7bfb87922391c0a572a2616a95197cf511d13e0
SHA2560c301df6b6f2f9b932a6530e207802d7b61c30f941e32ed06170ba8d7f77201f
SHA512f4438c76c2aedc214e411292f853c1d634523ee4c9a9e8f4613aec6548be4371484e0c2da57ad1bea72f3c1ed330392662d3cfb0d226503ebadbc9cfd863669f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd