Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 09:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://chrislynsoftware.com/uploads/go.php?dtpev
Resource
win10v2004-20231023-en
General
-
Target
http://chrislynsoftware.com/uploads/go.php?dtpev
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437382602681848" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4088 2940 chrome.exe 82 PID 2940 wrote to memory of 4088 2940 chrome.exe 82 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 2744 2940 chrome.exe 84 PID 2940 wrote to memory of 264 2940 chrome.exe 85 PID 2940 wrote to memory of 264 2940 chrome.exe 85 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86 PID 2940 wrote to memory of 1140 2940 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://chrislynsoftware.com/uploads/go.php?dtpev1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd96fa9758,0x7ffd96fa9768,0x7ffd96fa97782⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:22⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:82⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2768 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2776 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1848,i,8321944239782803960,6191971145576447106,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:8
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:6076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD586d5cac58bc57edbbded1cbc7cabb39c
SHA167f6484e8ae0f7d2417da84beac307ffb389e9da
SHA256d6acdcfac868d2b0de014ab6c66f9f9871289dc00f03223df76864eaacfd0cca
SHA512bcbca80119d59dbe7566975059802951c9d139eb366f48e579a0a3ad8d58703c2dcde273d319e382fbc9f5464574f59b903dbce6454a148bcfb85c16094e9e9e
-
Filesize
6KB
MD519ea02d9f042619afbc04fd6806b1951
SHA1a588cd98a107aa1a8c1fc16eba1e45eda7034329
SHA256487ef5e12b6e1c8ff4d9263dcd4f9c2ac37bf7664bbc1f72ef676b5e0d579acb
SHA51209c56d7675daef24d19558f28f7d2882eedd404cab311e1e66f92c777ef55d8ce813510660b178ba12ae3d107f23a25972b936e5d4e5f570bddea62a545bd4dd
-
Filesize
109KB
MD5e5e4b573990119b8c9628e240a9fff09
SHA114b6058b286d56c05717a8c2c6af4c8ef0e00824
SHA2562e2f9fb4ce695077c3d064f6dd8078d3c0c31bf29c70d304abb4314c68e9eed0
SHA512e750a2c19e21d449219087b78177791ee67e92cc2d868f1c68ea215abcef7237042ce70caf695e8bc6a2c7b5644aeec3cefdb469976c849a5fd5544a4693fc1e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd