Analysis
-
max time kernel
300s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 22:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wavefront.pe/ns/?46891251
Resource
win10v2004-20231020-en
General
-
Target
https://wavefront.pe/ns/?46891251
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437819698693965" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3760 4596 chrome.exe 14 PID 4596 wrote to memory of 3760 4596 chrome.exe 14 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 464 4596 chrome.exe 33 PID 4596 wrote to memory of 3680 4596 chrome.exe 32 PID 4596 wrote to memory of 3680 4596 chrome.exe 32 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30 PID 4596 wrote to memory of 4288 4596 chrome.exe 30
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd60059758,0x7ffd60059768,0x7ffd600597781⤵PID:3760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wavefront.pe/ns/?468912511⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:22⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=912 --field-trial-handle=1868,i,16716199997434394259,2649658842924144788,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52788ca98fd04116674735b4f2972fa2d
SHA195a0d0d9b1b90d464148cd9a3cc7b0b652101388
SHA256d57e8b85a91052a796158709c5c12ccb2f9befde0a40993fb3b2f9b6be4260ac
SHA512dddb64ac1f06359d16064758629e8127c6f7137713bc6fa14ee0d36bb93be848b30ab72b4249100182c65aeaf253d3dd430ea0df2fb0420068f500b5e18deacc
-
Filesize
6KB
MD5dd801d8451edf65b4f5fe4091457cf57
SHA15c0d1fc653718d87910e64ef45a8275f31897f30
SHA256b4dffb4cbfbd752d70f55b899679c381bbeedefd3de4d3e58b433a5010a2a63a
SHA51212f541e4f94271449ead4b53d56e1516beb6b9213714d5067f42dcaab66e1fe62c2a8eef0b26c22fb5947e386a12b0ecad19d58bcd3bc296810448843b8d2ab9
-
Filesize
6KB
MD598c00b45325e1c1ff67bac8ecd96a21e
SHA178b2643fbfaac4e73666f14e8622572ba8f50170
SHA256a5906f2d36f98711e20bea1fe9e24fa33ebf1dd10aeed79b3f27125c8caf0ccd
SHA51212312309b979eda472c41e35d7a85718ffdef526113ef10f51be534222ac3e08be62df3efc98cd0580a14dadf1be6ca5adc8850b2b2ff8fc6944ed4367f51b46
-
Filesize
109KB
MD5d36b7653112cef15f10e51105f8c779d
SHA1007a627ff0ea44747e01978353cc20cf47829d6e
SHA25634d73312c5dd68bf475df1020f4f5ca97184140bc282d5786989b277ef902814
SHA5124a3cd5bfdcf143e2f601087c68f932fea740724f01b14baa0affa4ea36c2ee583ccc8350b8eda24808199949b8721974a3e9d5706dda5ad95f64d18ee9c78afc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd