Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 15:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t.me/bigdataspecialist#44e7bdf8155f7a213a0a923fd36e93c1
Resource
win10v2004-20231020-en
General
-
Target
http://t.me/bigdataspecialist#44e7bdf8155f7a213a0a923fd36e93c1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449674028615928" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 5012 4916 chrome.exe 83 PID 4916 wrote to memory of 5012 4916 chrome.exe 83 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 3364 4916 chrome.exe 85 PID 4916 wrote to memory of 4480 4916 chrome.exe 86 PID 4916 wrote to memory of 4480 4916 chrome.exe 86 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87 PID 4916 wrote to memory of 1856 4916 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://t.me/bigdataspecialist#44e7bdf8155f7a213a0a923fd36e93c11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8dc49758,0x7ffa8dc49768,0x7ffa8dc497782⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:22⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:82⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2804 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:12⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2812 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5000 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:82⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3724 --field-trial-handle=1908,i,13532398993703130710,11488137353951681540,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD57f96ce71f633d34728735d4f5bddfa83
SHA13d72843146adf7334691febc52d1ab8abc1b3f13
SHA2564749624b888c2fda24671741541b22ae709eecec899a1fd3794a7147cba8a578
SHA512dc6fa96d9b5ab824211381a82786a715558c9f09988c86223e6f0e431a47ce8ed1390a3e8268669f3a195134f0fcf4050890efcbd5abad3e2adbb83977d7898e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\30e4414a-0715-4997-ac40-81b5c711d9ed.tmp
Filesize1KB
MD55f737944e5db0506a12ea55d76bc10eb
SHA1a0096e0101c64d6f0d8275b46dc167450210ec6f
SHA256f0309dff0e366fb2e8799b68ef2f43278d0fb0495dc691dc0428e7581d9394bc
SHA512687ce7a6c02657b6dc00b3af891948a92ef2d057ddeebcb31bcdd929c6db7c2f629ff7d7d6fc3b28fdeda3d0239191d14805d7dbc10c53c991daa44a3d3b580f
-
Filesize
873B
MD5d7a70faf0f4f0ec2c5717a3c99dc3e5f
SHA14cca629d9a3c8b8f4ab6ea4273f6d7a083c3f636
SHA256c744ac4791e5d829011123541e488d194800b4470ac61c8196cea265acf61ce7
SHA5125d4ecd4882a761cca857597e0a42789e69155c1ff781140ba79d40ffd2ed0beedb341a9a783330d2742ac78355613bfa341a5127b9828e4fbeaaa3d273c54a47
-
Filesize
6KB
MD51eff1bd0e685362fbaca7a47846272cb
SHA1203cb4eadcbfe4c45170970d49b83bc66d688ebf
SHA2565e945dc2b2bb62bf86de606352530442f7adb4874a0189981287eae47fd70620
SHA5123130fc878d4e2a60f19bdc86bb7db408e48e05d288a03476dbd107077b2ed579535019bb1af30318030e0aa15068c8a8e24a7cba163d21d0603bbd65ae8ba491
-
Filesize
109KB
MD5fe7d89d94851132d2510c08035038408
SHA183c81be090578275198c6a2a2ee7731ed5299fed
SHA25607fab01bb3555225c16c2b467919d85bd664a17227bf0f18733022409c494711
SHA51244209d47c0ea663ef001101cc74b1cffa9cda1e790452b3f79a88bb931c68cb4fb2158af208cae52c0b65478544164d2f752a689e9c98b4dc769c2e2ef116d56
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd