Analysis
-
max time kernel
1803s -
max time network
1697s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 14:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://185.196.9.161/v1.exe
Resource
win10v2004-20231023-en
General
-
Target
http://185.196.9.161/v1.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133447938751823936" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 756 chrome.exe 756 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 756 chrome.exe 756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 4496 756 chrome.exe 75 PID 756 wrote to memory of 4496 756 chrome.exe 75 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 1552 756 chrome.exe 88 PID 756 wrote to memory of 3700 756 chrome.exe 89 PID 756 wrote to memory of 3700 756 chrome.exe 89 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90 PID 756 wrote to memory of 5100 756 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://185.196.9.161/v1.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec42a9758,0x7ffec42a9768,0x7ffec42a97782⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:22⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5044 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1608 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4700 --field-trial-handle=1824,i,16658245051793568842,6091192290211085259,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51dc1a7b1ae794a6c80cfba34d1523fa5
SHA1a96c5d2e5532b38abd6a9f6be547a43530a9a07b
SHA256633d17342be77348f2ecdb4bb925ad911329ca64d93d775796a8f3437be8f2bc
SHA5123c1528c6b9e04d06b3b5c43bf8e6b8fa12d9038c5d47c5bca70faadf501391417e4affc884f15735440c95ccf6eb81377c21a94218f2f7efec968d6d46b2b9cf
-
Filesize
6KB
MD51b07e8a1b13e90ab09af41eb28366b53
SHA11640a7becbda12940200aec7493186eb33561e56
SHA2562838ada800042d319e3aceae7e166e2f4c30998bcf546cc060df60ad2b06f7f4
SHA5126037946f1e3e49b8b478269b8de36f4145c182f56e3ecec92b43cf5f0309cef106f43927886290b2b6a3c624119f632fc8f30e3af7aa87f878907a29332028c5
-
Filesize
6KB
MD5e93fd5710801fb96b872a7acd89409e3
SHA1ca3c4985ef1b0421212dab99da0194d031584c8c
SHA2565344e4212b0c15570b1d43b82c8b2e08089f4e303bfb2c50689655189dcdf3e3
SHA512f9777b8c495d2ca783f22defd93d99bb783069005c862c3fe525381e742c9b42254b09e7ec9851c44bd12927bd7def0884c5797ac5f3c90c288a6a6fa0e3531a
-
Filesize
109KB
MD51fae6f24e32c841dbd6d8d976460b6ae
SHA11c1f6918284aa8e562aab3013f9c1d1bdcfc925b
SHA256b2704507a4da158d019668191622e23aa9807593256cc3fc275126794047f77e
SHA5121245c0b1d2dde2f7ae687b470a12fbe8cc9c6b104fa31ca106faf01ee409c4a78811bbefdda8e1ab448e8c40f0c369a96841faed9911705d5016bc55d64958a3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd