Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 12:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.diametriks.com
Resource
win10v2004-20231025-en
General
-
Target
http://www.diametriks.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453043530918366" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1212 2476 chrome.exe 68 PID 2476 wrote to memory of 1212 2476 chrome.exe 68 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 2000 2476 chrome.exe 88 PID 2476 wrote to memory of 4784 2476 chrome.exe 89 PID 2476 wrote to memory of 4784 2476 chrome.exe 89 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90 PID 2476 wrote to memory of 456 2476 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.diametriks.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffe43409758,0x7ffe43409768,0x7ffe434097782⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:22⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4908 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3264 --field-trial-handle=1836,i,5109728679301300867,11562951011784473468,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5351cd1141c11767b7d365ea1695c713c
SHA141a3ac883f37da2c4c229ec2193e457af84ccb52
SHA256b3c6308df65bcf61b971a6ce31fc4d4423bfafa2d671058c2379f08d2581ce70
SHA512a02fca992719fdd0d3f5d2488b15d2b6be5c869940c84d942fa0807f8086fb7d699685f7680bfe1a27d4b25ee2f611e191568863731c49326f5d6a3a3bf7fe4c
-
Filesize
792B
MD59450cd0e0a7b91f1dfd15272134271b2
SHA111e13846db5dff0f31746fc2d5585c403cf767b7
SHA256e652bbd81a78d373d1d36fa3fe16aee7529c1aedc9cf241c567382c54b8cd0bd
SHA5120c380ed30a297a3000f8dca453b38c6895f0f928e6c22016f1b66a9f1a847f08fbe19683adddb8370c1081f103416239320f2f1a59b74a3ec848d774f7fdc6a5
-
Filesize
3KB
MD5c62c47666bd10138d128e7b79109b61b
SHA1de2704ead24fd9e2bee61ac80bb3c7dd1c313a1a
SHA2564ccfc5b0ed3414d94d1219a8cb608d49872caa2ea88e0acbc059b3439f60f30d
SHA512e5b6289e41a7b639aa93e800393e9ccde76cce1f5b799debf31b860898b674dd0a5cba85b89c55bfe2426a36362a21da932caf50b285483da1dae8b978a85fac
-
Filesize
1KB
MD5bb0f222b7ce1ac4fc6d7986dd8bd151e
SHA1a5713a2038456e14fc7328be88f04ffc4c473b7b
SHA256274515c2f854a6468d3b2294d5b1f8e1031e9dd9e1b4e56b909747234e1718ff
SHA512e7573721f0e8210990cc4f56bae58099c9c589d8cbea3892636c3fb3849f3b66de9b29b747642f81cf732bf50c82c5481db3b08222921a6e1adb699e4f1db0da
-
Filesize
1KB
MD547f2d33fc2ce3ad90e571cd73030b383
SHA1d6b548b6483a68a52ec3e690a67eecdebe5e118f
SHA25690114a5711c4016bf21723a210294fc4f3c203c668a88f9992ecb418214883d9
SHA512424c702f9ef18d782e901183fe3557efa10180d97cf128f128e422416f7bdcf6d8cbeebe40a91394328698c77d01783562545c0eda2bf5ad22df65797920af5d
-
Filesize
6KB
MD52e65e013c92d299c5513635fb5b429cc
SHA10fccdcb4008445d21920fb3f4f06e854456a9934
SHA256f952932ad9c1ade22d88fb226f31ee13f6986e471d1e37b6061d425f89a47fe8
SHA512b55b857175377b9d97d183a026fe19b000aac1a923f66d8bc9af1fd4bfb6461ac7b908e6fbe3e0115095fe965ac121c0b5c466ba129111f811827245c68ba320
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd