Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 05:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hostatogov.info
Resource
win10v2004-20231020-en
General
-
Target
https://hostatogov.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133432917225634444" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 5080 3908 chrome.exe 25 PID 3908 wrote to memory of 5080 3908 chrome.exe 25 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 4056 3908 chrome.exe 88 PID 3908 wrote to memory of 2660 3908 chrome.exe 89 PID 3908 wrote to memory of 2660 3908 chrome.exe 89 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90 PID 3908 wrote to memory of 5116 3908 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hostatogov.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c7579758,0x7ff8c7579768,0x7ff8c75797782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:22⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5084 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:12⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4624 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:82⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5008 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4684 --field-trial-handle=1864,i,4387209687084779359,3106474519384209188,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD52b570119f13291ea1132750c59c1e01b
SHA1f9e969d56f75f901522771f05dcabb1e68414479
SHA2560e23c177892ee70892504ee4adbf5334154e691138397bc164c88d2fa3c706fd
SHA51263ceb411906a17515405be7507edac6d943dc25baf4e23d56a7abdc54f132c203fbe614d2bd0da64f8347a14b6fefc9e0003c6d915099ffb67beb30eb2e4c49d
-
Filesize
2KB
MD5cc4140af06935cb0ad3e60d238d6411d
SHA1a819b148288a4e2e8aa705c5ea78a6670cbfca0d
SHA256a25b1099ccb5c236f53b68bb06b86922e1cc11b3b68dad85756aec8d6ab31cc8
SHA512208373226403e419795cce386b88b6e5fb7ac7a5ce0daf1af238378adcc16d92883a8cc91febc696d4ccb39989e7f291b9862a4d207e40394c0be1c8fae5ae16
-
Filesize
535B
MD530fb758393dff66397f5d0e1d146b262
SHA124671ae4330ef49ef1f02b63002aa11954729b9b
SHA256b90733643dc70a1a5974c3d35e94307fecb14f247d2968de154733a84d134b24
SHA5122aef780e611501f266a560bd72edb438370a8377bea0c93ff7589a60040f52c4bf5ab95a4d7773ec829cd3f0a9a87f0fee96c214b29a27f53b6ca5720900896b
-
Filesize
6KB
MD59946f75d63672e069422791ad1fef4ed
SHA139d35cb773c48a66ebf0b7843dd29d664598850d
SHA256070992ff55035d72986f24f631b6181406e5967d4832147d9a1e2bec0a03fb26
SHA5120806571e0988f3c09027999939043eb287cc2e07c5e2e6642bfb7ada6868c74d2ec91836fa338a3cbe7d03d94aa7b8e8ba8e7ffcf2214daf135b6080b9ecba2e
-
Filesize
109KB
MD569d98ee61960cdd2b4b779a41475a493
SHA1123922effa668cbc4f9f337f0aa5ac78ff7eeb26
SHA256bc64074b06d37ee25ad61380207a9193cd8ed90231d35efa6e2ce20975457148
SHA5121c9063c19f21f5b815e163141c75cd7c8bac62ca90de8916af912f8ccb33a61ed9f29b2e6fadcc34475f624c068fa0b126aa46c7a6e619942a5bfa6caa178301
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd