Analysis
-
max time kernel
111s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 08:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://xvhz.info
Resource
win10v2004-20231023-en
General
-
Target
http://xvhz.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450291745413498" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4428 3316 chrome.exe 57 PID 3316 wrote to memory of 4428 3316 chrome.exe 57 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 3152 3316 chrome.exe 86 PID 3316 wrote to memory of 4768 3316 chrome.exe 88 PID 3316 wrote to memory of 4768 3316 chrome.exe 88 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87 PID 3316 wrote to memory of 2672 3316 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://xvhz.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd3ce9758,0x7ffcd3ce9768,0x7ffcd3ce97782⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:22⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2632 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4520 --field-trial-handle=1900,i,13433468354294439129,2997610184930953005,131072 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a5aa16bcfe0e32885841414bfd530c4c
SHA176c00689b1e39cd622771c919cfc1dfc63b08a8b
SHA2564fb86508cafa209a3099bcd16946f757dfff40972ad312390819c54edab6454c
SHA51242552fd97f4b9877e004e8fb53157fde26f989707c2f390923007d48c13d0b3ed2a7df29690ea1529dcf0a1a2c2aa9e4bb21cc56dcfc1809cd61e1f2a1ed485b
-
Filesize
6KB
MD57fbc94b0e824f00f0c562b2f74a9b7f2
SHA18883784c9464d9630ca22e0998f308618b5761d2
SHA256abf4eb994907150cc22b4cc1e63a706644529e8d7848b3c16417221b2de4628d
SHA5127f822b738c4ea45163ac5eddf11ddf1c779eeef362968b2834c0f0ff0001558bfa3eaa9c889537e37940205c739afe8c3e7fd85279301336754a2b205a667315
-
Filesize
6KB
MD5b5e30a3de7281495b7e04aefdf1cb713
SHA162592c4412caebc0f27089156966ae965a942e46
SHA256682e9d23d5f983e3d0f5fd6496464c133676b99d1477d445f4d5dae0a3a008ce
SHA512950e46df911cb7bb5bd587a4416361e6b575f5f2dc785945a5b260c348414ebb93bddd0f59cdc651381f3c549ae4e211edcc0b141ca85777825ea4902274cd26
-
Filesize
5KB
MD522919aee5e319400a1fa40eff203db09
SHA1e85c749dbadf26c410b93c78a143c96db72b2557
SHA256344c3ee3991c05b1acd04c69a819088ef555488f7ac8b6217f9af7808da21e96
SHA5123e5c01ee1e393b92d5ae5b5e9fd6ed3b62b9e786c2f06773f77af65f9f9e3d2a182ff7c1aa24b77006099259ed0b14675fda63e5c7491b465512ca3d2585f578
-
Filesize
109KB
MD53416c8af26a42b635cd470838a76420c
SHA181ae4a8e794ef04e9ec385a281aa500d07938a12
SHA25600fb350e50f3292f02cf82aea24bf6158d3a0cc76d23ffaacaea4796e61ca547
SHA5125f545e75f9e2f345eac19c03d447e1a6b67146f13c89365d9aafa1f49fdeafab539d8d74807b8070c06410f5ab8608a4ca0b915463740a4f9b6a854eab4fe788
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd