Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
13/11/2023, 23:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://raw.githubusercontent.com/corbindavenport
Resource
win10-20231025-en
General
-
Target
https://raw.githubusercontent.com/corbindavenport
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133443906046469461" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4016 4572 chrome.exe 71 PID 4572 wrote to memory of 4016 4572 chrome.exe 71 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 4480 4572 chrome.exe 73 PID 4572 wrote to memory of 2328 4572 chrome.exe 77 PID 4572 wrote to memory of 2328 4572 chrome.exe 77 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74 PID 4572 wrote to memory of 3004 4572 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://raw.githubusercontent.com/corbindavenport1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb9af39758,0x7ffb9af39768,0x7ffb9af397782⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:22⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:12⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 --field-trial-handle=1848,i,4105831892424023102,6483837750110332370,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50c1effe503a2839d5eec7d532a179731
SHA1d72d36a013b6e9213dd6d8571b4de384235a58bd
SHA256e0b52cc58eed0d38459800112d50da69ba4ee81982ea3cf5236e499a86c0a8cd
SHA51285e86ce3b44d09b01bf84bdc1ef49808c45241789279f4770deac6d070abc719d77ff2078042ebaf8e0b19f3b0b10c367adbeef3833e2a81b4084fccf2e150a0
-
Filesize
539B
MD53a78b05a678d5c3c9c96826a6392ef5f
SHA17ea7fd19134499b42743a3a582d37b88734872c8
SHA256e6f79f8797b1094e8964eefe502831e98f008ad56783988ae7b2717745a4a40a
SHA5120f145a85d1212df563041e4c4762554dc15496de85f9cbdba5a6b0dda898b0312a32ce0484bf79c7dcde84ee01d64c9e85d87ca3dae13a5a5efcdc99c6e4ef23
-
Filesize
5KB
MD5b9f2ce104480a3b0c3ef60ace7feda14
SHA110a28eac318f0b64f0cb0cf4508c5f6f43c91c96
SHA256409feb085b84c1e20ff8fc935d69bdec5c3a2e4bd3384c11a6adfa065df19459
SHA512d3fd58861b790cde780fa9189643e940320e82cced666c1c3bbb7c5a30b53224ae3a02da00ed63fd58e7597d88fd33308398ff36398b2a4a527285fcdd9a3f8e
-
Filesize
6KB
MD5b46ce2e60248c0e7599b42f638570b79
SHA1e82471eeb99cf08f443b7218e25c763beec9c969
SHA2569d689f570e4e095bd2fd7e49d862993b728139b0c5845acea9a9453f404fbdd1
SHA512f5086f83cf4f3cd6f25e609bc12155352e0d64061bb25743ed9b82b5cb3be5fcd016ad35d112ef2d9e730fdc94e1e324bc86d3ba1d9259a23c15a05d1e2c6eab
-
Filesize
5KB
MD57219b5de99086636eaea610322f6806f
SHA10b0c7f3d12a4d00950c5f91acac72af40507bb1b
SHA25668e77638e25d37987b3c6c707cdd8481e8acd1afaa00ad47deff622bc02b2926
SHA512ddd10b396ef23da927f207f27ca992830455eadab362090bdce328db5669f744263147eb1da3d66e365adaaa721a0b3ee7fc8c6fd377c2e7d3aef129d0549eae
-
Filesize
109KB
MD51a5848fdaff6b0676af0c83dcb6a15f2
SHA18840741e671a89ee2fec953e38ec1f7915c82ba2
SHA256ed9b275de2b780952f7d9b4c605830f7b588adbbfa7fc0d4a849ec7eb8e022f0
SHA512ae89e7378a727e945acf9a09541d502bfd46bd5e321f228541950306f779643499c3bb8becc8ea5dd0e6d232360f57dd13485b45f7d1ad289c4cb8652e50840b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd