Analysis
-
max time kernel
35s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 16:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://matching.truffle.bid
Resource
win10v2004-20231023-en
General
-
Target
http://matching.truffle.bid
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445380092364729" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3768 wrote to memory of 3324 3768 chrome.exe 14 PID 3768 wrote to memory of 3324 3768 chrome.exe 14 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 3892 3768 chrome.exe 45 PID 3768 wrote to memory of 2908 3768 chrome.exe 47 PID 3768 wrote to memory of 2908 3768 chrome.exe 47 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46 PID 3768 wrote to memory of 4232 3768 chrome.exe 46
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa13499758,0x7ffa13499768,0x7ffa134997781⤵PID:3324
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://matching.truffle.bid1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:22⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1876,i,3202717863665967328,2159704136713888256,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54257aaa659ae35988179e617e9b3eefb
SHA15078c363b05167ac8690062a9d27ee55e0cf0107
SHA25654bf026796d687659cadf4b5bb96d4465ce6a9a19d3653f06fd9770be0bb1e0b
SHA512ee69ec90ee66402a4ab79269961fd1729a2fbb877f7017c4ea2c67d1f43d5dc961e4736a152e7dc00ea8b024ccec89cc332e5be23a6fec70825158c69ebfcd64
-
Filesize
109KB
MD5b4a95e6970ffd4d8f536a22253d73a74
SHA152b9989c239fafe94c94a9a31bcfbe320754f048
SHA2563d33079ebe858c441f05164ab9fa3726ebaf84a932f1270200790197d77743f1
SHA512ff4fdc55d4356dbf7cb7ff6b878d476e60c02a2d1c8230365ace2a6b1bec3b07fc2c651f2a018547c15ca0b12870cdf1e3c178ac3dc14599ee0441702bbbfd03
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd