Analysis
-
max time kernel
600s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2023, 11:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://rll.co.in/
Resource
win10v2004-20231025-en
General
-
Target
http://rll.co.in/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133430530581470087" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2256 chrome.exe 2256 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2276 2524 chrome.exe 43 PID 2524 wrote to memory of 2276 2524 chrome.exe 43 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 2936 2524 chrome.exe 89 PID 2524 wrote to memory of 4128 2524 chrome.exe 90 PID 2524 wrote to memory of 4128 2524 chrome.exe 90 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91 PID 2524 wrote to memory of 4460 2524 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://rll.co.in/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff976a49758,0x7ff976a49768,0x7ff976a497782⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3820 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:12⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4296 --field-trial-handle=1904,i,18097131496418822513,11950779213333934067,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5565a33e4923807f9b53d0eae5ba33ac0
SHA1478050cf585050945d19736d903d42362f97b531
SHA256f8711ea9d0ca158a65c942e6d97fb1e347bda969e4a5b947266bf92897da28b5
SHA5128c0d095d1505bf7aa04f7d5441fa6301675ae16d0ee4d060fd08d7160689d534a2592a7f2e483214f2ce14d9595d1b1adb2ba60e3494913957e76ff2bdb7867e
-
Filesize
3KB
MD55b7448b24478a96449c7b06f5d6585d8
SHA18612f0de1b88c67cb73ea645e60cce6a37b698b4
SHA2561ef60cdc5ff24b4894450768e4f4c4ed72fd98e62b33a93d3255a703ca39fdcf
SHA512eda12c0daf81964121d88b5564fd39baae696c7beac88a6124ba5d05e974e023f53bfe82eafe5ca88885cfa7f351aed89ca62f8a52546eefad21f11515d8bb23
-
Filesize
2KB
MD5781286ce9025b870572174333de48f4c
SHA1003a7bb43ef27bdc338ddc00f5bd0fb0bd0a9d58
SHA25639294ca8bca51bc19611761d6c776457a916a04c753a3ee46519f1df16cb47bb
SHA512cd2d1194cb4a1a07f520b45377a7d5f471d75c8be2d1f10f77fde329a1aea41c01e169ebb1194744bb1881c9807c31d016c6cef9d3518c8e1afde7af291dea7d
-
Filesize
3KB
MD52d7f62f66200fa2932751f1543047732
SHA1c58f9e0a231a682a64900acda4ccd03de37545f4
SHA2565382e3ef99be78df9a265e90c7907463dcc1e946e3ea4824d876961964f110c8
SHA5128e15189fbdd14d6a4a755f12fca1aef92718e2797ada50226e619163c5941d71fb050b6a6c63a92eda29f80a79d446747d2aaed8cb8e02e9b597d4f260ce67e1
-
Filesize
2KB
MD5c2c1dba19a5b3019f1b842b3a1d55122
SHA190d9279418e5fbb8426f8001d6bf255bb529a719
SHA2568d851cc5cb49a1c800cf90d680d6021c0c05505932d250ea52ea02a457c32e3a
SHA51226723faaa9ea27a67dfb994a0861a4f356afa6d2040c3d3c709b94fb5c4d577c67b07ecea3f227b3e47c3b18e557c4acaddb7dece9bfdea3ddaffc8e04165843
-
Filesize
539B
MD5ba2394fbcc56141cf8462babd8c84e4a
SHA143fb35e99a47e335dc7e55135ec6835f2b159361
SHA25685f0115b78a478446375ec5beb1a708453091947f78e8b0121535d2ce4257c83
SHA51210998e930f4de437e4d8cc5ffb4ad84c21215ef00612021eb4b1e8b58b8fe0f665c3808ee6f06f142ee786eb3137e2d4cbc54ca072585fe7c1c3f41ecec41663
-
Filesize
6KB
MD5a5d27f541a4a234ef7390e67bd651ae9
SHA1ab9f2487c2662d3925fdd914f6fa826fa2fc76b7
SHA256e0e66b1a2ad69c03adde1b9e5b94248995336dd24ee179f9331cdb7d67c4e83e
SHA512c41e7d97a52e572a918500c4c5eb6fae1e8bb8686be178346b75e9ef29d9ad9d89df6db3986fcca31cebf4fbea7c9d2fd511f6922ef6376ca11b0659cd542b0c
-
Filesize
109KB
MD5f839f8479318ab47b530e86b8d0ac059
SHA1842be073603bd189a9eb1f21fc3e0b1286f8acbc
SHA25606a0170b06d55edd34299f6e20220ab29e7bc41e9ce7d18f527df24a5dbd5d23
SHA5129d0231da5687981d746b5b4d95edf28e26afa36a9556770647533a1e9e9e6c038327ecb2f78dd13144c40ab220acdc65c8cef95b359001ddde54a1e6c390279b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd