Analysis
-
max time kernel
300s -
max time network
281s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 18:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://icstation.com
Resource
win10v2004-20231020-en
General
-
Target
http://icstation.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453232666054472" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 676 chrome.exe 676 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 676 wrote to memory of 1044 676 chrome.exe 83 PID 676 wrote to memory of 1044 676 chrome.exe 83 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 4760 676 chrome.exe 85 PID 676 wrote to memory of 3768 676 chrome.exe 86 PID 676 wrote to memory of 3768 676 chrome.exe 86 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87 PID 676 wrote to memory of 1004 676 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://icstation.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff859a09758,0x7ff859a09768,0x7ff859a097782⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:22⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4648 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5208 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3920 --field-trial-handle=1868,i,1434987764757792183,10118757138763128314,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5953e437a7257b991eac621e0ca6fff3a
SHA1d8aca6c2e7a77324dbd54a74e59e239ee895c753
SHA2567766d1ee683c55a1d320d778fa22bd9a604f4b086fd8a057debfdfea851872b0
SHA5121b1021f05224543fbfcc470b8f95f6e84846e64b614351e46a8f3ebfa16430c42d876895cf6ba406f03506d24f4709505410316c48c1856e170d815698b39512
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\0cbf6a21-8d01-4040-b861-1a8cdaa75a78.tmp
Filesize1KB
MD5cf0a4227fd6f0cbadfb1caceae9d010e
SHA121441cf59b1d0ce390c8057829acb6198d70164c
SHA2560c67a39b1d8748008288c887d4a313ed714fa92ef23b5eac5c2a25f943e5fa8e
SHA512cc73993def7221130f7dd33a207934831b33fd006c799f4d45be1124fbb1a85023c059c1ea6e6114bde9c5475f67cc6ffad0db9886b347e5bf22209743833e18
-
Filesize
5KB
MD55e23246ffc156c95e1b62bde2789836a
SHA177902cfdf238a728012dfaec998209d57511820b
SHA25666a47662fe8a176094d3c493c6b55a1e7d33cfeea0be8b804d299821fa39053d
SHA5124b2fdc7e7aa02f99c9a0a305c373a8e4b1761c08a87efb431bebf9c9816e5681309f9800bab06cc05d4587989f7e9f1a3105fbd52ed4d46b01c1804e81b58782
-
Filesize
1KB
MD500b4f0fe3c3cb0d4d5612071d9511dd0
SHA1489126679ab99b2da167a1aa154058166e5cb420
SHA256d794cf2bea95c3e814d1f629603e195bc0619b3491010f209c945e575988aa01
SHA512ac1bd68b816337360bf6a7e627280cfb796f5c11c19ae553e15e4ee7e839dd102692f382ca5adc2289bef4c5b4e79bcd4b66e252bc54b757ebe611bfa0821bd9
-
Filesize
1KB
MD515cc003b71954b5e3bff3396d42a2c55
SHA1c6d56170caea456ee93aabd36bf2af3c93ea51a4
SHA256a20167726551e4fff160cee54a4ed3029d712772d3bd2d9034355864f08612ab
SHA512d4245fc9bf62068144e104643af2918a05852ce93e35177874f82ab06ac43113ea5122d2d738eb29e935483c5d8f833883799a6f9db8d27fb224470d3fea5195
-
Filesize
6KB
MD5fe0b32d63d6cffc3cbf2ef34d688409c
SHA164c2536ecfeb5f680e29cb933912987f2b3e0109
SHA256bae1794e9f4c76afdc669a1252c64bfc513f317f63c3f63a1dcc873bb85a9cea
SHA512b629b3ec7c25f004caacbdb0f002b6450a9e23e116f5f1ec1b0d9f75b5ac572b7a598fdf2b8f8f5580b1f19ff3145cff9d8423aa7fde94d718b0cad7f996487e
-
Filesize
6KB
MD5f52c21600a001d3b0d53e3d690c6adff
SHA148269957ce411e060d1d802c10290f5ca6dd6c24
SHA25687fb12a30ab7a26691fbbdcf66b1d905504065fac51b6f9b10e607a7f0ae4a05
SHA5127b6a26a9f7221f5fe6e521b78cb8bc4bfba74bd1083a322e1581200e85a4dc65a08d7aee9939e0cec0dc63663f02b20b1c9832fd72e00e16bfc587875cbe9b2e
-
Filesize
109KB
MD5c1c051a82c711a9bb1e70eebb50f2111
SHA1c961028d62cdfe1b5ffe1b44c048b6788d90e461
SHA256889c1506699bcc57391ec366d1aa4b0dd38aadaaa341607c55964f978f09e4eb
SHA512314fae27567c686a804f73202def34f383551362dd3b9f6a1883d2f8e6f468ca7e52e9f540c9feece14fcdb12521c4a540bce5b78feea580fa1a28c99d9f52b7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd