Analysis
-
max time kernel
299s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 04:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://nxtmag.tech/
Resource
win10v2004-20231020-en
General
-
Target
http://nxtmag.tech/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450149813062591" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4636 1284 chrome.exe 70 PID 1284 wrote to memory of 4636 1284 chrome.exe 70 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 220 1284 chrome.exe 88 PID 1284 wrote to memory of 3152 1284 chrome.exe 90 PID 1284 wrote to memory of 3152 1284 chrome.exe 90 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89 PID 1284 wrote to memory of 4928 1284 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://nxtmag.tech/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb11579758,0x7ffb11579768,0x7ffb115797782⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:22⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:82⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4936 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3944 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5516 --field-trial-handle=1884,i,14450996569986604429,828423931618112887,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD59c36ce695b7dfadb6471386d01c3b41a
SHA1622b5fbfeba133acfa96570cb184c41c9d1dd95b
SHA2566c14117435f695968221f731c834088f44512c90894ab5147908feecbe319d2b
SHA512ade82eff720c45f7b185c5063d28ef1bf03a49883b2459140269b92f316ec971b1326e92c3669eb5bd6478d1b269e049987528064e4b47b553fb847cfc6cfb62
-
Filesize
720B
MD565500e6440d47bdcfbb02544aea954c0
SHA1fe9fef49b8b9911c88fe68e7e4112fe0d9ae166a
SHA256a8dcf208a69bd1e66699f68fcdef64dc49ffda8f7126e3f37b1acb215812d016
SHA512fcbe0869d8db48dd20311713f1cea8cf2634db1555b6018843c96d7c58500b8005b38a4b6fb68cf19e245181bcf92b5fd0b30f47e37a9abd8014018dcac822b1
-
Filesize
2KB
MD5b96302983fe599afe912892bc0076649
SHA1f79e0c002c6e6fec0bdd6976137dd1b1da6690a6
SHA256c97134283ef46129083773521177c606c6b10a7e52e264d7016e55c5e4f027ef
SHA5121209e270737c09514d8a70b3c39a7d6d4668f602ac37f69ad53d6f8f059e2428a94ff4a85624c7f6ac0b19ad072072e8daa166728fc6512d7699e7543336ddf5
-
Filesize
1KB
MD5bb8d6969eb6c9921cbb7c9dd61c8f6d4
SHA14155e8e363357c93ce1d6812027fbf1858142982
SHA256f11db71864ab16081a00e31ef96aa56154d9455c2499e56453b33c83ed5b75d8
SHA51268c19833afddd1633ac6fede53d96017e9ed5a30bc460a828742b5a51b74555bdd92114256c968ee0874eb920f6209ce38439875f5aada4ea09916718f3cc2ae
-
Filesize
1KB
MD5f63e78a665ac497654aedcd89b282b68
SHA1d0498dfa0d161f1bb6fe544d503196229c2a3786
SHA25677bff220d1c6ffe27b6b8df00e6d82f8001523d45a9d763245e16343dc8f1351
SHA512e13bd7d78ed1dd9de350d3ee9263d217b4ccafd0bdea007b1037def2c0c1f6600a86a34a7e02e3bed078066532caedc0d31d784e7bd02ddf015c2bff96cb1a77
-
Filesize
6KB
MD54455cd7ebf04fe94606c555cbcf879d0
SHA1fde0fa91285e152e765771ac7f0f64a04cef69d4
SHA256f736f2efa16a00e747f9be732966069cb98ceef8e3bb397a21401526d3ae5390
SHA5127e6bebe31843fe891d4a0ab1da07f84fab2a3fa5f5bf374596954e4704462d57ae31135e275f5043332ac695cc0408b4ef4510c42fbaa6b897f9be976a47f99b
-
Filesize
6KB
MD5b524598facc53c7e3007f185692734ed
SHA191d1fe24b10d0712e34a2ebf3e61a5acab4cf696
SHA25698e18013978d2098073b777c3ff53db2d7816e0c8488e00f5bc66bbdd0311e54
SHA5120a9282ba2e56c2d7aa0d3fc17447a2609f614c41dd1d6d3611cd9193965099d3a3ada4a3d140d9467c76d26f92ec40b5955f012e0870502a52e3572c8901a051
-
Filesize
6KB
MD57653cef8a9367d089697133a53de517b
SHA1a6af8a806bbe0487ea06d222de98dd3904e4fcae
SHA256dbc81fc58fe7333e19a9166f8b0a4a1e2a272918a747b3195e34f80d10168b66
SHA5126f511dd9070761ccb5b9183a0e23744e594def325d08f1b4157a53174dbeeda608e4336f215ad9921fdd74a17ca3eb57f214df9c8fb1e8ed7f955e6db4ebe4ae
-
Filesize
109KB
MD52d123f4ffbaa47d93e0e30907cc73683
SHA1b4392981f73615e43919ccb5863e5fb2d744b376
SHA256c82ae392001d3949de66e220c5a21f09ae0d618529dd2366d8f39156f1f72769
SHA5125865353b613d50a355a185cb44edf8b7611d341500054550be99c4036f467d929844bf4fce5ac012ee984f39641a015ed59efbeed4cdd3bf55f88925a37ac7ab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd