Analysis
-
max time kernel
300s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-es -
resource tags
arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22/11/2023, 17:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kapoow.io
Resource
win10v2004-20231023-es
General
-
Target
http://kapoow.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133451483984273496" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4100 chrome.exe 4100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 4244 4304 chrome.exe 85 PID 4304 wrote to memory of 4244 4304 chrome.exe 85 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 5024 4304 chrome.exe 87 PID 4304 wrote to memory of 1584 4304 chrome.exe 91 PID 4304 wrote to memory of 1584 4304 chrome.exe 91 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88 PID 4304 wrote to memory of 5076 4304 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kapoow.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc952b9758,0x7ffc952b9768,0x7ffc952b97782⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:22⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:12⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3272 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 --field-trial-handle=1900,i,8443703978229990379,7436526207438610535,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
891B
MD5ed5c9dbed102fbf7098919f2449c0a1b
SHA1c47d343e6b75f30e7b1a34f14853bc28d97fdccb
SHA256dd9372b5987947b2418373aa171dd3b08943e3201ae1534de5150056798e7263
SHA512bf8fd7dc944048e37a7f00a698001ed5311ede63cff921d37cee2962dabccff526257dfd9fed20f4defd6114e063c75c40b5a517a6e2dea83b5cffd9fa17cfce
-
Filesize
539B
MD58eabb5c97580fe3f4e457401c09b5585
SHA14670b87bbeea04de359ebafb7abd7f581ee6ee17
SHA256ad5b0b6c8b629d3d25ceeb8e3e3efb9145b3a0496fe6147403add9920e50ae26
SHA512b45bf820453f714384c0ef35a139d78c424400945b062eec1dd1824b170614af23c185d40d243d91bf24b6b3ea6e1b3afefaabb3f83bec03f7ce5cbf5c52a374
-
Filesize
6KB
MD50fe3e7d8c349c36f2963198abab00a72
SHA1007463140a0a9a89e17fe6725dea99f5d8d985ef
SHA256fe04e2d8c90cb6a816ff14c38ac3e0d069b04701c82bb65c725ebed294f78d5f
SHA512b9f41661366aa93c48995a36f8671c34da95e053655b0decf8515cffc776105845305695e116ab41afc94a6b458e82d21c935056d4e43bd3ee995423acb60a90
-
Filesize
214KB
MD5dd6bc8c1e639adfafa34b894d5a7343b
SHA1ff51563c2dad692ccf2b5acdbcf9e9e1908e2303
SHA256562cde16d369d108f60fbdbb3af6efde3ce1c0dd5484f84564731f24471598d8
SHA51272428166633727af62652cbe4e4a2cb83038062fd373f2d02bf68a8d91cf5489300b9c1a6f6e4f03133d814155957cd178112981ded753f49da295c720a97391
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd