Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
15/11/2023, 08:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://7qncurdi8t.sihanol.store
Resource
win10-20231023-en
General
-
Target
http://7qncurdi8t.sihanol.store
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org 35 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445109812867724" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1584 chrome.exe 1584 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe Token: SeShutdownPrivilege 1584 chrome.exe Token: SeCreatePagefilePrivilege 1584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe 1584 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4432 1584 chrome.exe 40 PID 1584 wrote to memory of 4432 1584 chrome.exe 40 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 2676 1584 chrome.exe 73 PID 1584 wrote to memory of 212 1584 chrome.exe 74 PID 1584 wrote to memory of 212 1584 chrome.exe 74 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75 PID 1584 wrote to memory of 2960 1584 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://7qncurdi8t.sihanol.store1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbb5809758,0x7ffbb5809768,0x7ffbb58097782⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:22⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2044 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2688 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2668 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4400 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 --field-trial-handle=1692,i,3434293407041388564,15949207708198221652,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD51be4f1f5a642d635a0bc08e637726f0f
SHA12dc56b6eb53fb1c377e7ca556965a3f822db84c2
SHA256dcd0e6b08acda1039b22f99af9c27ad7f06fdc5c47982f00170e6bf42f4af18f
SHA51236cb5b72bdee0349df75b14cbae0424445e8ca0e051c653782321a72fc9017257c8e11a8273f372b992a3609061b507ab6510d67238c28286b653bd507709397
-
Filesize
2KB
MD593897692ca82a52babc070bba2eab8fe
SHA138f953e203e94304b5c4ead73b6dbfd08f382fbe
SHA2564759d2084dcc927ee2eced971b2c7948f160feacf2ffaef866b637ba63b48ad5
SHA512cb4f847b41f9250466c496bb577bf4787dea4219047c571d3121a67e67f019b81c0963b38c2c342a19b482ef7f2ae13b5863734f4f473e4bc3c956bffe25a908
-
Filesize
705B
MD535f1f4e2b3481d4d10de8e99d296340d
SHA1dd94f53d467d136354b1d818dcefa768ed59d21f
SHA256f1c2afb6830f2ee3624fa8b25c03609afc7b9be6cee4a03261db205dcd697c2f
SHA512ae29aeb2e359e99151bbf164b43d4462a1a122ae2bd91bc068ff7887c2de6ecb6f70049a522fd826d40308a05efa727508a3e515f03bf0a827d70b77144e07de
-
Filesize
538B
MD54187ae5a50a7c13a454b72e283139664
SHA13342e70ae0ec0792c8554fb427aabcc4921b3146
SHA256a08de98cdf6f2cc17c12dc285985b2f75aeac94bdfe02f0e27eaa9083e27f538
SHA512d1191cd2b0afd73cebbc7a94de70dc282fe0cc707e97bd8da382c358b8039dcc5a29f3c5e9a88e1b78daacad79215372bcb182399279c380a61e6cba63a5f692
-
Filesize
5KB
MD503c389fe5127021af789fbc35d073fe9
SHA1d61f58ce2ed13e5842e235c6ef1fa41d0a44a702
SHA256280e0e8b7047dbc3033a28156e2a384fc82e0f5702dc51e98c78a826fd912f74
SHA512fcc41e20092fa90fd5b115d0d1d3c2253543339025a621b332de266ae0a7030b5daf5627c46d4ed40e1fdf5738a80580d9df99db2243211d92239bed7a2f8c4f
-
Filesize
5KB
MD530ca131927c6d050034a06ccdf804c64
SHA107b18b3e49177cdc0e08ac094152e7f29320d06a
SHA25619305da7a9641ed484c2511d96b16629f8c505eed773fc4410a98c441f33af63
SHA5127a5789e5a7ec29e46e2e492c1abda51ba542db9a56e60167aff8645daf47850fa4b3ddbe65ad734972b49633ed13c1349979707ea1e81e631823a411f34aa0ea
-
Filesize
5KB
MD58649b301065e6af09bd97a93ffd1ab1e
SHA17f5ea1d1cc12223e183599ea7cabecc40c6e1b06
SHA256eee936fb0dbb7f6a4699750309d74f9636ec5b868c684d281aab76cf850e4f99
SHA512a661628459b1f7ff61f4d1b8af7b71940b10d094ef820c18664d2371d631b2cc3f861d4567753514ad1cae28f9de5f4343440f3a888e4b47572b3a0fc69d5935
-
Filesize
6KB
MD5c6849a8d46165328a940740a14ccb7ee
SHA12f81288ceb5ecc4ed636d964325bb6a189cf5842
SHA2561a8ef1ac41b24a0eb575c1f6af1b38b92ab208dfbbf9dfcb3b20297ffe1c1964
SHA5120bcd7184a651b8c6dda8d23a92dfb75ae3270c3b30df31dcc54dcaf622e19a8a8749c4691e0b1d4ae3347e5af98338b6a3ae95f16a5fc029161909c5d9507e77
-
Filesize
109KB
MD5a88b31fee43e819348dffc81e14254c8
SHA1bfa8613516aec688481fc4562f60eaeab0ad6c75
SHA256facfc1a9fceabf594ec5f92766d735c34ccbf1fa47b014f40e32a7071e8737b1
SHA512e7eefb720bba92eb91219565e44fe7d14ac88c5eb3b3b1680567f4617f08cf1c967db4b37ba08037cb424f3a48a9711aaaddaefb80762477754573e73e601e23
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd