Analysis
-
max time kernel
360s -
max time network
323s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 07:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mythialauncher.zip/
Resource
win10v2004-20231020-en
General
-
Target
https://www.mythialauncher.zip/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450244057807678" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 chrome.exe 5016 chrome.exe 4064 chrome.exe 4064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5016 chrome.exe 5016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe Token: SeShutdownPrivilege 5016 chrome.exe Token: SeCreatePagefilePrivilege 5016 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe 5016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 1108 5016 chrome.exe 75 PID 5016 wrote to memory of 1108 5016 chrome.exe 75 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 2980 5016 chrome.exe 85 PID 5016 wrote to memory of 4992 5016 chrome.exe 86 PID 5016 wrote to memory of 4992 5016 chrome.exe 86 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87 PID 5016 wrote to memory of 1128 5016 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mythialauncher.zip/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed78a9758,0x7ffed78a9768,0x7ffed78a97782⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:82⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4588 --field-trial-handle=1868,i,12067411584481917269,2583986301980833815,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1022B
MD54bfec75b3230f16ad7f54b1d8bf08072
SHA1d5525aa6d13851f69a6ea6112b6142957147ce94
SHA256999cd63fa0906a16073b6382d7339e6f7ce4d17b00513c98c6454e1f6c273a3f
SHA5121f4c59fb0b7b731ae5f7c25d710046de040a33face33307e5657edf5194856883c56ce19eee43434ee870c7ab6cf9caac3bdbae1f295117c01c99ce1b5355919
-
Filesize
6KB
MD59e88bc1ce8240395b987c5628cb89956
SHA12cb25b793769b0c462b3b1765be6f6f7a616a206
SHA256b2fcc49736070e7025ca088f3ab03d48c9540b7b2d28a0d5cb1edc3b6b5c6ef8
SHA5126bf13ccb07a61e09ad58bbea59f67ae3a95eaa4758862d68644403f80c62fee54ee6f31c5f62f71e680be57d51986a51d49bc487abe249a4ff92966bd85ef144
-
Filesize
6KB
MD53c5ca085880e466a050b8d690344161f
SHA1552d163202adfa58e075ccd0dbb7c2b16f639476
SHA2569ff6ab51a14962ae6be31c1bb18ad2f514666c29870306812f2e7442c43d937f
SHA512d6ee85b973a02585c37b81459bacb5d57607ca540d8948a2f793869c14fcbd91657522ddcaf08059dcdd4d0c5a7fafe3ed3c61c4f3366e474ef96754dde09ae8
-
Filesize
6KB
MD58c964ab1ee39e4987cfb367d812afd8e
SHA1d738c9c2941dd15713ca0b1ee6ac09e12e41cb12
SHA256abdbe4e845f3aebf41a7512a9240e2b875f0482ea4b7b34667970c36eac65104
SHA512bdef6fdefc68c380a854772f0747aca95ddc1f92131bc3ac9c24d16889e1d1bc6e37625178c479a9d1271204859d2296379abd337b60b672ad2cc7206346016a
-
Filesize
109KB
MD55240962cfa6537f333a510a7bb35f878
SHA13886eeb66ccc8d8e17764b2db2c6286d70ff6d66
SHA256ebf09ab5d17d768f3985d4b5ee12eb1b0905cab8f37dccb83edc2c8674f3a0c0
SHA512344b13f81632e10e6ed12f70f1df4afd790fbbac65326e7bf451d9b1c34a3aabd3ecb37740a5e7569327764201afb7760104c19a995050c5b91c64130549753b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd