Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 06:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.myshn.net/usage-analytics/#/registry-overview/service-details/43203
Resource
win10v2004-20231020-en
General
-
Target
https://www.myshn.net/usage-analytics/#/registry-overview/service-details/43203
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433790060695577" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 2944 chrome.exe 2944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1540 4360 chrome.exe 80 PID 4360 wrote to memory of 1540 4360 chrome.exe 80 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 964 4360 chrome.exe 89 PID 4360 wrote to memory of 4892 4360 chrome.exe 88 PID 4360 wrote to memory of 4892 4360 chrome.exe 88 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90 PID 4360 wrote to memory of 1776 4360 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.myshn.net/usage-analytics/#/registry-overview/service-details/432031⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc45709758,0x7ffc45709768,0x7ffc457097782⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:22⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:82⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 --field-trial-handle=1904,i,14549006024506410410,9201472930636032900,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5a1d24c2ba7da1b2b16a631c15e7555a9
SHA194bdda948bd840d2a68d03b4c59cf1fee7204435
SHA256365e2c6f004c1a4459ac93fedaa52e4f0eede88a1e00c162272c2a01f0a01506
SHA51265716d2a305adfc09e7c5e0866d6d89e4112fe9e8a54c59a652408549c3aa19ed169d8e78c6bdb54527d9413179343b47c1228dc5c629ab101d56dbcc1275bd4
-
Filesize
2KB
MD54c6dfaa0dc574c6bc98d7c7e7475b928
SHA19f0d051590eacf077de53ff604e643a48cd28254
SHA2566d67d3f2fc7932af9bc3722eefa66b0c888340615229b0020ee93dd00e24321e
SHA512e2e6c2684fe75cd94933a9602026feb66e663485bf5b51bee53608e776682753ed9a93941ecfd2996850c2e2b0b0b50b53351682edc13c9a613ee8777dfaa69e
-
Filesize
706B
MD54978e987fa1e97a939ef6e8156453989
SHA1dcb956b83a6747d985753cd3b392c55d991bb031
SHA256be41b132ee28935b1fd724be2140e1ffdb09d1276001e10ae1b625d0e9489a79
SHA51278c52c1d79c75a9b6b345e46d3e0b99cc685a48c4a80617849528605c36de76672c5b25c8be917edc7c7c201b58a520964cec55927e29a1ed78ef673f6568942
-
Filesize
6KB
MD55902b1f1a9664c6c7f1642911c4dcc07
SHA1f42665cd3344a3723069e59f328c2f8a9242b938
SHA256ca645b050057a9d5318eb92457a1f00e515d326faad138a058c627a12a3ed6c0
SHA5127e3da2649df23b4a0cd34958cff47905d7dfe6440cca4107e5ab4ac629794907f4de9e0e5cd8e76d348a09ff95aef52c4697ac9a6374f610fd2c31e707562f82
-
Filesize
109KB
MD53c3d5ee96556fe94ba0de7d279949e71
SHA1ab3b20bbc644af5c58a3e5c324adce3723657768
SHA25679d98aad3a6e773060cc8dd575b3b9b11edcac26f218d6e5c6658203ce32d35a
SHA512cb736465092e130404b8fb5d89397f603a657bdecb478cca4fdd744ea2d5c3b6339814e03b9cdad631430a49579e85154f507eb47a3870199538dcb9fef0db21
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd