Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 05:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pkMO.biptked.lat/2uTfrZ
Resource
win10v2004-20231023-en
General
-
Target
http://pkMO.biptked.lat/2uTfrZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133438079092329132" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 5104 3156 chrome.exe 63 PID 3156 wrote to memory of 5104 3156 chrome.exe 63 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3444 3156 chrome.exe 88 PID 3156 wrote to memory of 3508 3156 chrome.exe 89 PID 3156 wrote to memory of 3508 3156 chrome.exe 89 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90 PID 3156 wrote to memory of 4668 3156 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pkMO.biptked.lat/2uTfrZ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x9c,0x100,0x104,0xdc,0x108,0x7ff83ff69758,0x7ff83ff69768,0x7ff83ff697782⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:22⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:82⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:82⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:12⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=6112 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6016 --field-trial-handle=1868,i,6256673385533143323,15646765364221068869,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4625acda-04c4-4cdd-b33e-e651c95915ca.tmp
Filesize5KB
MD5069921949408687a17fec9f9453c6dd8
SHA13a6172f21f0842de21326cc1e0a384bc96dc679a
SHA2565d239b6e7f379ab326eaa5ce06c10da662b5adbd2fd5e7e1a00a79199525169b
SHA512c90ae0e1a0d12bd5abb79ac33d13b5442912e81c271830ed36b2a334357cf4ad899c95504e2db95442913cd7301591fec6bd82cbed269f4a7a2c05c67691fd08
-
Filesize
1KB
MD5f809749ab6a251c0a84d2586ef257026
SHA161b8d354c16dec264e399876ea2ce349618c8572
SHA2561c19e017f2888bd6abe70b42377afe7af00802ba8b9d5480e27a73591c022b53
SHA51242a570fe7288219b457f37c4d00c7b37e02a315449a9adcde5fe776a4bb3b294998835404be0a048d9a94ff5160cbf73b110cba84ac8492e7e82523b5cc93538
-
Filesize
1KB
MD5d9d927240e8f77f13280ef8bf0d50d4d
SHA135e569e021859b6556172295766b93220330f428
SHA25695068eaffcd051ce5627fdc0e836a992b8b7f3b239cd5a840c750800fbba4daf
SHA51229f6ca6f7a776e704307b11cf55a1799f6cc7a0b9277452907bac05b7519ea0554b3fcbcfa72ad434aedaab87fd101860c2b5cea2c09a91e097a14e36502b138
-
Filesize
5KB
MD582b7f71992113fe68e28cc6a7cd7e53f
SHA10da2b1b52371eaf6b9518943b49434ea928c1057
SHA256810fad079ddee096fc03d12fbc0734b9bd4dc3865f4afb99371b24af413feb6b
SHA512be1723c31f5ba44e443be838f1e87a6ab1f94888f4cf47c353c4290b8b589f1af5c7e3c0941cf0d651998e6260baa1d5689f5993adaa16ead2f7ade7c21bb1e9
-
Filesize
6KB
MD5a5dae9dc2400fb25ecc8aee820ac778b
SHA10099067f642ec96f653ddd13c88ce95850c0c81c
SHA256866dae5765d8c8957ade1fc646aac3c3f20d472422e403fe1c8d8c5bce04a42c
SHA512935f8475ff4e0cedc311cf1af9ac268910043b6339f89cd4f78ee9ddf104cfff8f990d8bf376b846a4a8475127e349bc59298c494f5197a8d1843a866726980b
-
Filesize
109KB
MD5fce6a396b676028c51ce81b1ecfdf7ec
SHA19165e2befa0771c57e3928c02a2b91e456b325f7
SHA256d8406289f43930662ef3df1039e41aa351a381dd00706df9e0dc42e02506aec2
SHA51288d60e54f2f1d8561ef9f3a586a534c65bb8d8a639b86dfd1e164564146a4f330d137c3507268894e6adb2c4ffeccc915ac2cadf6ff8f71abc9a1e899c391274
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd