Analysis
-
max time kernel
59s -
max time network
50s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
30-10-2023 17:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://02w65ijjohr1frm.com/vvmd54/
Resource
win10-20231023-en
General
-
Target
https://02w65ijjohr1frm.com/vvmd54/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431608881429098" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2844 4464 chrome.exe 71 PID 4464 wrote to memory of 2844 4464 chrome.exe 71 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 4252 4464 chrome.exe 74 PID 4464 wrote to memory of 3448 4464 chrome.exe 73 PID 4464 wrote to memory of 3448 4464 chrome.exe 73 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75 PID 4464 wrote to memory of 2296 4464 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://02w65ijjohr1frm.com/vvmd54/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa2f119758,0x7ffa2f119768,0x7ffa2f1197782⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:82⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:22⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3868 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3112 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4376 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4472 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1572 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4620 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4600 --field-trial-handle=1704,i,5850175608125236763,8830948939544580829,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD526f2b1ab23cdfd261335650ffbc3c732
SHA1458a89cda9c60d72049ff0c32ae62d94894a7f4c
SHA256533e01a6384179ec53c77d9c2dc9b1ac2b11963ef98570df6db0cdd761f071a4
SHA5123885df6b8c6e516931b565196bb1afa68e7ad36c89571ce21405eb66aa73591d233e556e30467fff8e231963a2c016311b8cefc70939c087d7d4e26560f7d1b4
-
Filesize
5KB
MD558aa087a5cef2a119d5d4c83fc596512
SHA1e2d5263b04c749eca1f2126301e97c40a1baaace
SHA256c98c087717f6d2ba3b38a291b5e9aa3b738c9fbb66ca8c1388ef29c38076fb24
SHA51208906b25833ed3b27ca0ae8f8b189855bf75a515d59a47d745e0661b15a7592b57b78b7cde2d452558c8708efbf8393e9c64d682a2fb9ba34b8c8866dd543eca
-
Filesize
109KB
MD5052ccc37586c1c025fd96a4dc01cf730
SHA13d75bc8cc276ca55d91cb7853ada41211d8653c9
SHA256d074bf02310f28eba5ecc10250f64a9ba881fc85106404ae7aebcee3ef2d8025
SHA512df0401166ce5e2b0c80387a4898cd8cc16468d6e311b2efbbf1ede616ecb778dd49ef0df3c6981e985e79b8f25adc89fc81a693ba3fd9e4b72dae1309efe74c9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd