Analysis
-
max time kernel
196s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 11:54
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bafkreie57in4tbummtnbihlkxp76j44umwgr5hfm5nrixozvuuyhhbzy7i.ipfs.dweb.link/#[email protected]
Resource
win10v2004-20231023-en
General
-
Target
https://bafkreie57in4tbummtnbihlkxp76j44umwgr5hfm5nrixozvuuyhhbzy7i.ipfs.dweb.link/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446093541743633" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe Token: SeShutdownPrivilege 4604 chrome.exe Token: SeCreatePagefilePrivilege 4604 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe 4604 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2104 4604 chrome.exe 85 PID 4604 wrote to memory of 2104 4604 chrome.exe 85 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 3736 4604 chrome.exe 89 PID 4604 wrote to memory of 836 4604 chrome.exe 87 PID 4604 wrote to memory of 836 4604 chrome.exe 87 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88 PID 4604 wrote to memory of 4176 4604 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bafkreie57in4tbummtnbihlkxp76j44umwgr5hfm5nrixozvuuyhhbzy7i.ipfs.dweb.link/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedbdd9758,0x7ffedbdd9768,0x7ffedbdd97782⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:82⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:22⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:82⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 --field-trial-handle=1984,i,1079387728337749315,2108473453263347677,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD581ba91c7b36e13822a6a9021609a11f0
SHA14cbc1fd40810be56c1b0d863fc71586bdddd75fb
SHA256e874c542ce5a4819143a69c4c27d3079d12ad5e384b25907472054ebb628488d
SHA5124a10d1f0103b34208919b01f9d3312804a45d105c33659f2724a93b0ab3ef20aee324a9375745bfd09d31fad43d343812a7100fca2f999dbf2b0ecec467f73f4
-
Filesize
538B
MD59684e4af750994c876db0de19403be23
SHA13975bce712c3143605d0bc9634749bd00040e359
SHA2560a0b7e0d3ad966aded613a414a22c009b1c1b0b2ec1d731d8cffddcfcc45d7c2
SHA5127e017b5cf1917d94b42d7255dc6d3a1c1ffe13d9b20abe4790000598de7e177036cc497f43ff949e927629225da223156b768fc9d68e623fcb33c9e3ff67098c
-
Filesize
6KB
MD518fd4d704e30449831be1fcd187a20c5
SHA15cb24e21164307c44c75dfe7218ff2b639734127
SHA2568a254a339675350c64e58dda882b776b395ff498e99973e6b5a0298d94120150
SHA51200aa295608946b420928996e3beff2e75f447026f790d34a7e5450ace011eb5d6f9b38954e20ea969b93c6d1cb520a59e796df5ca494984c215b69c0bb83a5a7
-
Filesize
214KB
MD5833706f3d6eccca15e22b123653ee293
SHA1481561d2dac4fd1e1bd2fa8c73e83379471343bd
SHA256c1ec352af577d9d255972d17b5b2ba58a657ffc52e12a3c6e37496742471d82f
SHA512bfcb25cc06da3bd579023035e3ab562cb107b181d51aeea482e03b0832a9536bbeed537a6b656ed4fe749aa6d9f2f59e0e94b055f7fc2b82ee92ba067a22d824
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd