Analysis
-
max time kernel
300s -
max time network
287s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 01:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hk.cllip.xyz
Resource
win10v2004-20231023-en
General
-
Target
http://hk.cllip.xyz
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133432753489865485" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeCreatePagefilePrivilege 2716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1844 2716 chrome.exe 86 PID 2716 wrote to memory of 1844 2716 chrome.exe 86 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1840 2716 chrome.exe 89 PID 2716 wrote to memory of 1028 2716 chrome.exe 90 PID 2716 wrote to memory of 1028 2716 chrome.exe 90 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91 PID 2716 wrote to memory of 1396 2716 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://hk.cllip.xyz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95fb49758,0x7ff95fb49768,0x7ff95fb497782⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:22⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:12⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3960 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2524 --field-trial-handle=1884,i,1175383800729788139,11037142493896571880,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD584c044a214a183cca4d38828c90f395b
SHA13eb3211bd3f9106ced8c470d99eeb66550e0de7f
SHA25627086b9de1c1234e3bb67cf41edd3cda0b9eaa6279ea9580d6154875071fd8de
SHA51221f6e0d2d5991ad79dc2d1b80e5351fe982802ef1e35a81602e46814b245af0688ad0426240d2df38c6880babb747247a4dfbfdf718a523491f284345f241455
-
Filesize
1KB
MD5a4e5e896970839061a5fb6eb6886d77f
SHA150db10daf7668ab35047dc173b373744cb969fb1
SHA2567a6bfcab136d8c1f648e7c33c1ac000a33f942fce17a4ea1bb04a394d2a5be22
SHA5123f7968660d989df82de4e4ee7c2feddd5506bed78d3f6614408c5bc68da1c0283b8738d0820301830d93f8696be0d2ef62e7d415b5ed08ba3c7453689953ea92
-
Filesize
707B
MD51a70ca8b17443bc20e14279a25fcefbf
SHA1827005097ce1b018141cc25b61a399234e144c3d
SHA2563186241aaca8bcadacaea471794f59a935a18b011aeb19731dd16c4478427dcb
SHA51241dce20694e9d3b74afe8dd25030cffcf438ee6fbc32556eeab2ff58bc676d4bd9df36e37b9a143989a86d85074388b13bddf8c1fbf501cb659d091568a78b1e
-
Filesize
5KB
MD57e9bf6e50893b12656a0575b307f5614
SHA13315d02cfb2f1605b5e14d322c44927ae1a74960
SHA2569d3a9de1ad2fb77ff34c77328c6615f4e2b46e47256bef152ca7a05e1873eb4d
SHA512b393831e52732a40f90e6df273ccae8a639bc1bccbcefecec4a0e0008a09fd0a8bb8731be93f61fd473652bfed92eba03b9ab6702e369d050d803222e3cc4d3c
-
Filesize
6KB
MD52b8e41c4ea46ff040dc7e82c845be8ca
SHA1f14505fd39ec7977b9cf3aba5c18fbb243686933
SHA256343d8475fcdf7e64ce80412150af8920420c01cee450240bad9c1882247a49fd
SHA5126e62f3aba2070ffafee39b516e020de7fbfabe478faf9ea092fb254624318fb6156adb5ea6be746947e78ca35308420767f4919bba224b9ec68e487aeff2fc30
-
Filesize
5KB
MD54c9ffcaa49f17cf8aa9150beaeadab91
SHA19a4457a6ae5ea69aa5bd2aa261c421794e7d7755
SHA256cc4a89793b0c89c6372563623ced6b6ecb6f0a0f68540135aef4ce58a13180a4
SHA5125828860a8606624a70654303180da9d24efe5a0d13586705e658d6e1d7458ab3a391df5c5c1741a61e1b00d4e4ddf04c06ea8207cd504ffa6f25eab3b7be0a52
-
Filesize
109KB
MD58553c0253aea98091dd02cd021d966db
SHA1b3323c731a72f9524da902511ddcb0e1c59bdb1d
SHA256f35bcf441ae6c962f4603ceda61a83490422d3a87c706ca25c3d6fcf4c65b5da
SHA5120ac768644398d8d4730df97b6c62eb9da92cc53d4836778ef41533977cbfaf5317b40227cace5d84a32db8cb3bddbb5b348d8f954e21eb62aae1b8b1583a46b3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd