Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 05:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://claimautoken.top/au
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
https://claimautoken.top/au
Resource
macos-20220504-en
General
-
Target
https://claimautoken.top/au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133432036362620753" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 536 chrome.exe 536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3208 4976 chrome.exe 39 PID 4976 wrote to memory of 3208 4976 chrome.exe 39 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 1332 4976 chrome.exe 88 PID 4976 wrote to memory of 3004 4976 chrome.exe 89 PID 4976 wrote to memory of 3004 4976 chrome.exe 89 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90 PID 4976 wrote to memory of 2288 4976 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://claimautoken.top/au1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb86069758,0x7ffb86069768,0x7ffb860697782⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:22⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:82⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:82⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 --field-trial-handle=1876,i,17426600316432890576,3356436911193264060,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD50720350ab5bdcaaf7507ebee61a7a494
SHA1df141c63d169a53a85dc1025d684e9d9fd8de3e7
SHA256677749148d37426c733d8c2aa78560208d7ba961fed74a6edce8ab89daeae993
SHA512411e09998ac282b4b12a7a8e80d110e10e26052c6e94bf918b3a1e026041a94d1c2887c744909ea4c17e7e2e3343cd04bf36e2665347507355cd02a4e9a4a1a9
-
Filesize
2KB
MD5b56e817cbe5e34cbdc4886ce19e73ad7
SHA152da5423d2816fb4b2eacdd84f113c7bd66c1ef9
SHA2562d496aa3675365f4d42954195050d5c66ed5a53d51a3eb75a486037c8f1e262a
SHA512da18bfe3d0dd6903597a97231f9032e1826846ec32a41e2d3a73d68a09a12c45dc6e32f02d38e0b736020156f62196751b0517854f195968701f104824f99578
-
Filesize
539B
MD5b0c1122b904047f05153a8c913b177f9
SHA1b3c8c80f405dbcc97ccf69827268c4a55d2882ff
SHA256c271c39b89f7a293a277d9ae48629c4f92ce56754f937884a8f518cc06d13842
SHA5127bd14dc3a567b01ad97f1f44da5e31841c7551cd087ec1dbb1edf13866e42e2ec3a9c24e17b921846bf4e06b17360ae7c88ffbd0441eac2023a9d960891fcdf1
-
Filesize
6KB
MD5927bbcc8241a2ed82d2632ecd048cc11
SHA19b3d5e7b67e720609c63f5fd45e69d9692afcba8
SHA2564e789d25262012441848fcb5fb29a0f147d8dfbe5bf8288c22bb5fc96ae831d1
SHA512bfde1c603f9c5dd9755d253717be93d703f1d3546d5c8fa932b8758fe6aeeb7906e0f33ab96f31042e13ca4a24fc91093a291ba749e9ae3856db3a04e721677a
-
Filesize
6KB
MD5e89ab91b1b6fe45f2bcbd3db1f043f65
SHA1d426c1e5a0b5940c6ddc92c394e13a697e45c4a3
SHA2567e36cb82a29f5b6017b94ba69aad2332b7fa6dabbb54f93d5b854097d3f38023
SHA512d05fca0c6be8e65ec23a53b7a2174010c4fbe902e6b3be1ace02caa32869d86091c0ce34ee109bfb2ebf225fb4f95da6d0d40da3c5e208e722b40efe65a87368
-
Filesize
214KB
MD575de5bbbe6d8d17a822157ee696c787b
SHA1b6123b23f2021eb50faf70a774e786763a9474b7
SHA256cc20c2540f44dd2bc3ecd6720854f70d357b5fd4d6bb9be2b67a25a651928dfc
SHA51203d446a27da6c71f10c990358d64398a6141aec9cf834e53ee353ae04a6491b9334cd0b7e38259b040e5a8ca1c18136ca9d8f193ad421f539fbe950919e181e3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd