Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 13:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://verifica.34-150-236-102.cprapid.com
Resource
win10v2004-20231020-en
General
-
Target
https://verifica.34-150-236-102.cprapid.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133426269386207410" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3024 chrome.exe 3024 chrome.exe 3416 chrome.exe 3416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe Token: SeShutdownPrivilege 3024 chrome.exe Token: SeCreatePagefilePrivilege 3024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe 3024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4868 3024 chrome.exe 17 PID 3024 wrote to memory of 4868 3024 chrome.exe 17 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 964 3024 chrome.exe 54 PID 3024 wrote to memory of 4740 3024 chrome.exe 53 PID 3024 wrote to memory of 4740 3024 chrome.exe 53 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50 PID 3024 wrote to memory of 3364 3024 chrome.exe 50
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://verifica.34-150-236-102.cprapid.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffad5589758,0x7ffad5589768,0x7ffad55897782⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:12⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:22⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4756 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2976 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:12⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3840 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3332 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3408 --field-trial-handle=1904,i,6827181004471212734,10131793658784240798,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e7c5e00aba19d2bfc778d709dba3825c
SHA1deb3f32d118f3892daf37120672f8cb6170764d6
SHA256f41b9db7494c3421a35af908544c61c845ce50bdb428c8e5c96400c10a6b2615
SHA512a01f74e420c6dc9f5348b47ea6740b6cb0258df824e212732e30349f6131585d7661adb90c6fece0ea9801a0d4f3cc42162e0a6007c03d84cd2da02ef312c82e
-
Filesize
6KB
MD5d260c49c2c3319a020cd85255b2ffce1
SHA1d1b929fcd36efac01b6031401e1587dd8eb5f39c
SHA256aac40f7187de52c221e538910eb2b65c1b2d4ebe7218e8eeab7a09ae9b97666d
SHA51277690a18d082c67e93a3f5607b35ebbe7f2f857eb319932e2cd988a004fb985a029e57bda02daf569085a149ffe0109d0f8f83669b47525f1fb78f6010b5a01f
-
Filesize
109KB
MD521402a302bddfd95009ea20c29433479
SHA15cb6d5990aabc2fd1a98652c430a4b446c6ad34c
SHA25681631f29a6bab73a900c8ab3c71576bb7759732e4dcf6cf43b20ef2601b96045
SHA512788bed3714b20f0621bf3bc9daa26dd42112333dcad3bc6835e18bda002e51e3e1bbf793c3a68ea774a66882eb423fb78ce37c50f793d33ce7d61b54ffbbe641
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd