Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2023 23:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://at0payeftau.cc/
Resource
win10v2004-20231023-en
General
-
Target
http://at0payeftau.cc/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133430940279390447" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3244 chrome.exe 3244 chrome.exe 1500 chrome.exe 1500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 2824 3244 chrome.exe 76 PID 3244 wrote to memory of 2824 3244 chrome.exe 76 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4760 3244 chrome.exe 90 PID 3244 wrote to memory of 4708 3244 chrome.exe 91 PID 3244 wrote to memory of 4708 3244 chrome.exe 91 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92 PID 3244 wrote to memory of 3772 3244 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://at0payeftau.cc/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xa4,0x108,0x7ffb486c9758,0x7ffb486c9768,0x7ffb486c97782⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:22⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3932 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4104 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3864 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2456 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=220 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2528 --field-trial-handle=1888,i,10015198732095935899,2123390742521782835,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5186321f42abfe655a9f57b7d8713a27f
SHA15be29131a620b9ff41b5ad976ef4b436b1f679fa
SHA2566438bb15f20d6d4dbf54152f88769feda54a8dcf63de7d836285cf0b4eff29d0
SHA5121533a59ad4706cc337951501e00711227bfafe3e187d873260bb49fafb8bcbbe33fd51c1823391a1af4ac584a3da7964d3c0d39fa03e9b2349214b6b23c2ebd5
-
Filesize
6KB
MD52b1d889889d5d9d90f61b7ecd9b3624b
SHA1c67d45ce68e02b7ffa395ad9ca17eb16bcd1ebe2
SHA256a7543d9cca7d830ee20c9c3de4c3f848a39046d0836189f1c70163b003e389d0
SHA512753e9f5fff3b80852bd4501245f8a436376743f533d4913ce26700423102e239cd359ef4e5171464444e0c21b2935f07a21315e4a4189e82e1227cdce5169459
-
Filesize
5KB
MD511bb2cb8d924255c793231a5161c9672
SHA1875cabe391aa6dea2917299259b5a47b81dfed4d
SHA2560d1fc8c1b231696cfa1e3257b808c19346333bf94d9e71d119537746023a174f
SHA512ecde9f438b19e5a96c53abb94156e5163cce824568456023327a96b936e889c4cac5f16eef4a5abe468f9d83de06e125a10640cbe5689109891a039322200097
-
Filesize
109KB
MD5ce233d0a04259443a5f45ddd3ae82a8a
SHA11a5dfcef4f8e489df572092efa58c7249ea0b704
SHA2567ca9a86381b9e902d9188d0f4bb984272712e1bdd0c51a6cb3ba767669f0addf
SHA5122b78d22b74c3caddfc5d84cf1fea7d44661a9308f1ba384b1995cdd8ce36960f2f0d1b6a2fdad02a73f3922565eb0d878c8c4d2d67223b4e565b09020018b999
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd