Analysis
-
max time kernel
39s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2023 04:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.reddit.com/r/TearsOfThemis/comments/pb6qm5/guys_hear_me_out/
Resource
win10v2004-20231023-en
General
-
Target
https://www.reddit.com/r/TearsOfThemis/comments/pb6qm5/guys_hear_me_out/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133448419155792571" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 1444 3468 chrome.exe 89 PID 3468 wrote to memory of 1444 3468 chrome.exe 89 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1708 3468 chrome.exe 91 PID 3468 wrote to memory of 1784 3468 chrome.exe 92 PID 3468 wrote to memory of 1784 3468 chrome.exe 92 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93 PID 3468 wrote to memory of 3136 3468 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.reddit.com/r/TearsOfThemis/comments/pb6qm5/guys_hear_me_out/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb3339758,0x7fffb3339768,0x7fffb33397782⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:22⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:12⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1880,i,9257949753209318799,673840269467003778,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e1bf96c07ef236344181eb1771e40f07
SHA1bee175de9329b61988249da3e66616cfa4145036
SHA2569b249abb6e5b1b82a1800ae5b651140359da0212795ba6ab9639d2d8d39da039
SHA512a5adfd33913331e929f1e0484882e3262ef451e8843cc74944ee0b509ea9f022c16b2641a61fbc5476b8c8ff652691cd878f6dbe5164c1e44512d8ffab7d9fed
-
Filesize
872B
MD5a0f8a94f8fa777cd8d9ba07a21019838
SHA14badc64233375c70ad94c01219061e4094fd8959
SHA256b7da7304fd389b67d521650040e70cfbb4504025adcdd32228b88000ee899ae4
SHA5126fcf686ba34a0ff8f0358d00e08fa97749d7d80a3f56acf5cc601c4d5f7c7f579e921dfa26993169cdd8840f49ce350a2b8048ad367179cfb0a665e33aa1e293
-
Filesize
872B
MD521146ed9c740582d88dd86955af28284
SHA16fd173b506e9c8d51094d0cbf9feb8671da76772
SHA256dd10600a578ed4e66ccd05031d5df79e6fc2222f173232bc82dd11016f739faf
SHA512b42d63e8b715cefc1aafdf688b3b36668d63ca535adc2b75f674629d64f74a5b23d687bfb403aa2584b41fbaa3e9aec07400da858e824f51ce5f9b778b4d053f
-
Filesize
872B
MD5511cb280cef584994040731eee255d8a
SHA1bd7c282cb7acc3116ec4ccf81d43ec5dc81d8ac2
SHA2564292aa524406adde8c92ee30f9c97489d008e4765216edb7b9bd7a7815bae1a6
SHA512392729faa2abc94043a6a9304eb58430b3dac23189d401bbd8c0aa015979755e1ed24211080d07716368d6ed5e93571c52821b7003b26fa17bd2f38f60145e94
-
Filesize
5KB
MD56418f282f8401549ff9138fb69d1e59d
SHA1845781c663ab2066213c4ebca24a4015c3d0dcac
SHA256aac47bf9c16c1c4e38b9beb23f944f352343d63ac373d4e5a6e395546c53255c
SHA512cb05a9f5c6c8899bacaa9e442ffac3b47f6f51f70b5a03c2c1baa2b9d1e596f4ce1763370e9a3a6934211f3030582e30436b5557700c4f51091ba383ee0b6007
-
Filesize
5KB
MD507588afd7ee66de7b4a9b72a2f30d7b6
SHA10055dca3763d3a3d1ec6b57eebbea730b1617516
SHA256e4e9efc255090955cbfeafe9ee2208e1af2e483533f52842cce4d3bf59fd2913
SHA5126a831367a9dd9642fc839b4a47ee01f89a86a313f6c544f2b7603cf1633b3ce676a5bdf9e89bb2d0d4c1992c27d61af501651690ed2a04a96a809ffef8e1c7e4
-
Filesize
109KB
MD58f1bf3d7ff696d24e80b83f65f775863
SHA114ef391b5f8ff847d2305b7a8d9406b17f6f9128
SHA256ad9f5e2d1b7166c876968ec9926569ccaf169b5c9839fecff5b8194606212577
SHA51296ee915f345e6914ba58ebbe184a4906349a8196df527860fcb667a6c574d34a068e4cfbb403c48d2f70c57bda24084dc0f6b248e8fbfa2714990868da8acbe9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd