Analysis
-
max time kernel
1799s -
max time network
1693s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
18-11-2023 16:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/sikwfl
Resource
win10-20231020-en
General
-
Target
https://www.mediafire.com/file/sikwfl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133447992145724735" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4072 4680 chrome.exe 49 PID 4680 wrote to memory of 4072 4680 chrome.exe 49 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1256 4680 chrome.exe 72 PID 4680 wrote to memory of 1264 4680 chrome.exe 73 PID 4680 wrote to memory of 1264 4680 chrome.exe 73 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74 PID 4680 wrote to memory of 4708 4680 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/sikwfl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffde8399758,0x7ffde8399768,0x7ffde83997782⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:22⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4444 --field-trial-handle=1760,i,10195860126599778857,5893380837643764225,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD574346361a6afdc8cbceb2dc5c0192441
SHA1c8abb81f6d6b7021fb70db605fda0d4b45b44939
SHA256b8e1c05ded3b6f8331b029a9896afc8edbf956ec9873ec2941f07d993c9fdd85
SHA51230e098dbe81b5fc6052827c997c15d78729fcb8c58ed921217eccb40ca79445014bc0d5315e8be44376b28d2b3ebf2a5576fd903893325a5ffc502127ccac7ed
-
Filesize
3KB
MD52d9037a510053d7f0cf387eb93a14690
SHA1d3f733df249b5d10f2aca36e66621197d1257c52
SHA2563c4d85d03fade0b280f8849e70b82afbffa924a318bfb00b9c449beccaa31257
SHA512409d426bc8164c5819be19c6cbfe86afdc574848a1af67e712448fe34220b6faedf62fc90e5f510d3a000d74b716860b15f46f4e6436a8807a9d4349c203cdfa
-
Filesize
3KB
MD56516b47e3796d56e51f6d6385dfd15a4
SHA165bc6e4adf9e1ded76d84464b8268151a801086f
SHA256f79243716ba806bdd2cc903f694746939a8c85ed95e80409572ff21f74a4c3e6
SHA512276d8d3e3912418951c7a365faf4a2b3bbcefc151b023177b2b7167396b2035bb194705e5b272cd754160143be15cae7e558ce34058603d0cfe9cba84ee6b79e
-
Filesize
3KB
MD5bb3749a2b0439721746d6b849054a6e8
SHA1cbb309a58bca29952370d9a8b91d6a607d80a0b8
SHA256613a456bf845bf93a32b6c69441e1ad3b914a882e711d97bb5147fadaa11eaab
SHA5127ba87b5ccda14eeebcf5876f57508c7834e351435afb63cf60104a0a1afdfd59e1a3e06e0eda90cd10bfaf06228b8a1401c785ca2e0505dedad6eb9ba8272304
-
Filesize
2KB
MD59c14a8266299fe03531270a965b202e4
SHA184b85ea9ea5a34b30c8cff7efdf80f4322289677
SHA256be3e0c2ba4019d87958899256ca546aa9c8b0e169a7ce3dd019a850d2263c4f9
SHA51254063ce29ccf6de0d5a8a0b3b659bc8a59e63c1d193f5892e6168aed01df6eec263781bd755ce301218e2c50974bf5ebaa80e8446c25ce2e78a0fa9e03ec6064
-
Filesize
539B
MD5b1591db4b67a623d4de9254da905236a
SHA117a120797911b89d537899ec6870f5d799c6b3a3
SHA25663132a7ba0c3e878a7cb31780dd6a36944cae697b1c3e18049cb5f5bd00e7a83
SHA512fe66705169db3ee622e147bcc972241c5d1112fffc5ba993378f56bb67a68d056646ec5fbafb78df1fe532c052ca8252439d2f5400aba30a64ea8a6dc0764197
-
Filesize
6KB
MD5d45a6addba45419cf37448ad6b5b8209
SHA192d138ebfc98fd79374e6d9e557d5a74fccb1993
SHA2569f1fd1dd8b50abaee199f618cd4735d2ade741d44931e8bf89e26ea72b667ce7
SHA5125194808a19570ed7b3cbe4eb78c1efe5b85a17afa1a3ddd5271fdc4e3fea7bfd2709162f2f7717d5ed61d08a45bc65ce8b0a99d16c933e0e2f7a0ec6e453cbaa
-
Filesize
6KB
MD5221197f4492de03488ffb7150a97ffac
SHA121ea4d3b56c1b25cf34881d7a738d325259ac0d0
SHA25636908560264fa1b88cb920580959a54d7009f4032dbdb5d5240c377b52256ce5
SHA512261fc4a551637e737d50c20fa22ed4a94ad444b43a1f7280b967a710345a3eab0f7aaa2042865d90f545b9392bbde7820924bba8686c488b48ab0336af01386d
-
Filesize
6KB
MD5ab87b2b224c67c0c96950b148e7d4021
SHA1a349325e53d637fc69807d60cccc36d43cf48300
SHA256e52d963a20d8065f11e5ea5e83e7625dcd87a943361bf4b0061455aecf4b5283
SHA512e3a27ac6e5fca158a475c5d1e9f8abb3be160d9190c5ed44b3f6c1a22b57df2c12af4b1f6e52e48c5ca0d65bcf610b1bae04dfc887793a41b53c93764aae6d39
-
Filesize
106KB
MD5e2836de215fcede758634197dd39f060
SHA139822a34dac6da9291b8aa07df2852d8d396e7d3
SHA25697c6f2401369c85d64ff9060552ba4c06261abbc228e62035308fa4495eef29c
SHA512a0681434daa078917d13434b7e69f11e883b56b8e2791c663320dd22902ce9b5f44ff8214621f4402382b70c07db02a9fa4847524d928f6a7d2a02adacc6dbc7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd