Analysis
-
max time kernel
36s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-es -
resource tags
arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
21/11/2023, 20:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bananasquad.ru/paste
Resource
win10v2004-20231020-es
General
-
Target
https://bananasquad.ru/paste
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450719057646193" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 440 2464 chrome.exe 55 PID 2464 wrote to memory of 440 2464 chrome.exe 55 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 4692 2464 chrome.exe 87 PID 2464 wrote to memory of 3052 2464 chrome.exe 86 PID 2464 wrote to memory of 3052 2464 chrome.exe 86 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88 PID 2464 wrote to memory of 1528 2464 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bananasquad.ru/paste1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fd9e9758,0x7ff9fd9e9768,0x7ff9fd9e97782⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:22⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:12⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1888,i,12418769480669037990,9057089006861197309,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD518f2a806de94d784bd14a7b424267fee
SHA1262e6194f3879444cb2c4f2b485795fa6f4bb01a
SHA256be9cf0cd566e1d28b4d6d37b311f863c2d3c7da79fe6c31fe09837ae848866f7
SHA51292cbaa037eedbd2809fca00e75ec24fded908002bba5f26d81e00a770017bd41b10d34a76673b650d8b0ddd1337f8aa088036105f830a747265147d96d8d257e
-
Filesize
109KB
MD5ef37bc6a66c9cae3a7c99c46daae9b48
SHA156a1e93c47e5af86ad2f258cf8f51da63fb1332f
SHA25688480a4eae351f46d4521c4564d54992ece9d814e77e6b56e44cbd05cb2c1be1
SHA5128e06625093b7f654c408fae6bec744489b74562f63e60b9ce86b8190b5d332820fa4032397e846b2250bcf0a4a75000f467a0ebc3bf433c175b7dadc7baa218d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd