Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2023, 03:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://epicvideochat.com
Resource
win10-20231023-en
General
-
Target
http://epicvideochat.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433708857841675" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1016 chrome.exe 1016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe Token: SeShutdownPrivilege 1016 chrome.exe Token: SeCreatePagefilePrivilege 1016 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2760 1016 chrome.exe 71 PID 1016 wrote to memory of 2760 1016 chrome.exe 71 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 528 1016 chrome.exe 75 PID 1016 wrote to memory of 4904 1016 chrome.exe 73 PID 1016 wrote to memory of 4904 1016 chrome.exe 73 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74 PID 1016 wrote to memory of 4808 1016 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://epicvideochat.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa04299758,0x7ffa04299768,0x7ffa042997782⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:22⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2788 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2656 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4772 --field-trial-handle=1888,i,15857015792226065393,10250709985599630030,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552B
MD572cc5b82541346bd2fdf4b41f1fd7917
SHA14470083ea6a27e019612b363ed2f4c0fd6f2bad0
SHA25626f5008997bfab505b103f97b842bed932eff523505c3ac462d317c2a2e021cb
SHA512e32fb7322e4ca2d624a7bea3d2af251f21753aa667ec17f3d889dc78d337f99e39f638fb24a0e6cd99ad281b85df12ee29ad1971afd47e98064de04d5e7124f4
-
Filesize
264KB
MD537cee29bd65c6e0adc0904ac37e33003
SHA12943382650e3acc15b90ac9a0af53b8e0b0654fa
SHA25629af8f4f99edeaf5a0e997efffc4f824216c40d0d172cd668240014c2830d137
SHA51267ad08343628eea76c3ba3e3e3ec99e3af9abc7cbd08997edd79ffd522aa0b2f8f8e7d5addbc78f197976fbc17a283da75208e7b376a5c5c7def0d22f09b5b0a
-
Filesize
3KB
MD5eec2ae2b393147fa57fb2f86c27066a7
SHA1a5bfb156d0f644d4c1c553ef16a57e4782d3d6f1
SHA256138cab1c38e65ca0c6e18f09acad1c0c4f9c16f556dd375fdffee5fa8917a9ce
SHA5127541bd14b03ee2c52f2d7c3ebe523c53698de1fd0446dde775ca8f6809c4c4964655a8362c253c640f35a4638a30e58f70ac17f60914735392e199a6aa86563e
-
Filesize
867B
MD5191d853b59ee68af4c4217465cead1af
SHA1d2f30421c3ee7b1f6c8a3919309fe0dc3b91da8c
SHA256d1bee35879de89d58a6b9d12b8c6e82979b5324626ce3582da5878ab63d613ed
SHA512334c61eca7bca8dbf6a2059efd236260e330ad7c07b2a39d7df069970ca99bfeae78b8b41dab96661c066265830a59957330b658807943a3bb42d1f84f3513e8
-
Filesize
1KB
MD5a829e86b21cb66e706cd2ae4280b18cf
SHA160b485af70b495a0215cb3da3db283c4ee96b58e
SHA25644ee3d6b5ddd2b60ac73eb7d755fa234edaa99b09df58558089cbe07cbe15c66
SHA51234377d4c3e4a94bcd6f8e5eb5349c112b2031798b7bf812e8ad7a6988500c927a490ffd7604972fb31980ea7e4f5d2f0a38c0e01398fc3cb78563076ce61ec62
-
Filesize
1KB
MD51da16f53fcf5db5be461aeadaf001085
SHA13df47372ba64c54f37883725e22b8e80c4ee6b7a
SHA2564484ceae2a4637689cdfc47751514d4ce3ce10e412f473f63888b0fefe6a1cac
SHA512d5725d9ec6dd1c5088a4861f5b706877de9b73a4e517988632ac7e8469f45f98dd351eaaadc351b8eabb90a70b29bceed3aa319151b3a2d827097203f640c259
-
Filesize
6KB
MD55d3898fc5fe9b6b7496755ddcce55778
SHA1cf4cbac468a92844b212ca6fe6d6e9f57510ea6d
SHA2566e9e392329872252d4b40bfcec34202f469535152034c5e0756840a6b579d05e
SHA512a1641e2f1709cb0588d417f148ca1b21e55c94acd3432a80b1a10b8db548867bd384775357b68ca6fdde95e8bac906409d314a41ebede7ff7353e05b7d6b3e32
-
Filesize
6KB
MD57c51db5f1a1b75377e7e17356b4ebc4c
SHA152922f82c5974052850868cdb91903d8fb47590b
SHA2564b934de96773b9e8c2a325bdada4160ccb6d141261a20cba52b14b0b6136bca3
SHA512299e55539a339b2d2b25a5dcc275919e0c511f64b7b6b710b3f813e7de1cee740e3d0d0392ff1c0520d19e686cb802805ebb698ccb42c79909fb5cfa539005ba
-
Filesize
6KB
MD542d638f075ad6b6c8ea48ca1ccdfc6d1
SHA1dde59078b53dc8137ad8b7dfd160745937e0689d
SHA256ca58d7d9d5af357c79782e3da0c65e33f78a5c322b101232d2aa6beb6f5f2020
SHA512fca63d18543be29db910e831cb251cbcccd7e67781a5fac52a3f3c3c41965740d936c176c557fd93a8ffe603d067493cca7ff80b4447882ef0ee7cce2189398d
-
Filesize
109KB
MD540346c568a7c8ff24088137e9a4bda75
SHA13386b1e0b2894de8be88d73b86acd3a6fbc732b0
SHA25612ce9c5f99da3db1d948dfe501a306c85c05353e87250843090dd867d360f673
SHA512080608bd90900b4b0ebe3f8bd02eb37c5fd7859171c0f8619bbc1667413f938640ac6b41b8014851253df6cdb817cd5d5e4bc0d73b44a623348a0fe29020d683
-
Filesize
109KB
MD508b8e950c1aba6bdf58980e1bdcd8d36
SHA1b59fa1631c4cda230530d443a88ea318e7ff1320
SHA256198c8bdeb1b9bb03ce32d508409df7206651526e087c2e38d2453ede335ec73b
SHA51238d976e869010ddbf1c1c37c1b1f5d23e7134fe99609517d5491ac15365e216ef94c7873c3f6cca332ef5d647a96ffae307b04af8b219c24eea3f93ee2e36c49
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd