Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2023 18:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.sidekickopen52.com/Ctc/I6+23284/cW7l304/JkM2-6qcW6N1vHY6lZ3mGN6-5kwCm_V0cW4FZRBf1LvGcyW8S5x0_8gMLv5N2wgp5csF2ywW3nLtZ63w9nzvW26jD8H3v5C8wW1-5-rF13mx_yW2x8H9T14sTPNVnJQGt8DjtpDW67XZBg46sR9DN1FwHD5xkqj0W1YJpn03_FV2DW6kLQq66gK37JN5GVf7VX4V-cW6JXwDr4WF9Y3W3cPc623zttfLW6lpWR66sZYKBW2vqzTy5Yvvn2W4Ty8X61dYPKhW5cnN2g1Dj48lW5TJvY64Wg7y5W3bjHl254Y5ctf211dRC04
Resource
win10v2004-20231025-en
General
-
Target
https://t.sidekickopen52.com/Ctc/I6+23284/cW7l304/JkM2-6qcW6N1vHY6lZ3mGN6-5kwCm_V0cW4FZRBf1LvGcyW8S5x0_8gMLv5N2wgp5csF2ywW3nLtZ63w9nzvW26jD8H3v5C8wW1-5-rF13mx_yW2x8H9T14sTPNVnJQGt8DjtpDW67XZBg46sR9DN1FwHD5xkqj0W1YJpn03_FV2DW6kLQq66gK37JN5GVf7VX4V-cW6JXwDr4WF9Y3W3cPc623zttfLW6lpWR66sZYKBW2vqzTy5Yvvn2W4Ty8X61dYPKhW5cnN2g1Dj48lW5TJvY64Wg7y5W3bjHl254Y5ctf211dRC04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453255681052230" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3640 chrome.exe 3640 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe Token: SeShutdownPrivilege 3640 chrome.exe Token: SeCreatePagefilePrivilege 3640 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3068 3640 chrome.exe 37 PID 3640 wrote to memory of 3068 3640 chrome.exe 37 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 4508 3640 chrome.exe 85 PID 3640 wrote to memory of 1148 3640 chrome.exe 86 PID 3640 wrote to memory of 1148 3640 chrome.exe 86 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87 PID 3640 wrote to memory of 3088 3640 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.sidekickopen52.com/Ctc/I6+23284/cW7l304/JkM2-6qcW6N1vHY6lZ3mGN6-5kwCm_V0cW4FZRBf1LvGcyW8S5x0_8gMLv5N2wgp5csF2ywW3nLtZ63w9nzvW26jD8H3v5C8wW1-5-rF13mx_yW2x8H9T14sTPNVnJQGt8DjtpDW67XZBg46sR9DN1FwHD5xkqj0W1YJpn03_FV2DW6kLQq66gK37JN5GVf7VX4V-cW6JXwDr4WF9Y3W3cPc623zttfLW6lpWR66sZYKBW2vqzTy5Yvvn2W4Ty8X61dYPKhW5cnN2g1Dj48lW5TJvY64Wg7y5W3bjHl254Y5ctf211dRC041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa715d9758,0x7ffa715d9768,0x7ffa715d97782⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:22⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:82⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:12⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4876 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5000 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4700 --field-trial-handle=1844,i,4445822285107136363,8936895155343746367,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52a0ab213eb8351904dcae6202fe7eff4
SHA1b469454878a2f006054cbad75a89efaf2a6a0557
SHA25665f3b15b5255e30e9fdfbac83517d2a15638d426214494b5f9f19e11a755508a
SHA51229b2b9932c6c1d0efc0948df87562559dc348cec8044f0a0b575ed6ea5dbf3fb1b50e73d723d3239a5128b0834e57d7b7775c52bec25ddeb09c359ea6f920c44
-
Filesize
5KB
MD505ddff51f644fc9d1be16362132ad8ce
SHA1432143265d9286391dc3c4440af2b3b365377937
SHA256d834f678dce497a53c10b4e666f9e0ea3c5176b9ac52180d9de2e9008dc7fa39
SHA51292b7a3c31c43e527768a13f6e33aff1b2221deaea6ba544760ab2a3d6180cdd3d31748c0e57f58b4893edafbb3f136ca6aff280238e0241b289b1e9e05acbf00
-
Filesize
3KB
MD51f3e26a3c026a3f18d700a6f3942822f
SHA10e866dae77e13e05887e1a99b7c60d1df9aac0ac
SHA256e9f29ec6b86da65d5e82f62abae9bd832ed8199fc60c1ad2d5f8397c70d71cbe
SHA512019af47aaed9d232ef389f90196bc6009b93b143a1f53df59b4507a0d8188238ddf7cb26366bac6f221114b05a2e0f046ea8b9a249107d731bcdde61c24195da
-
Filesize
6KB
MD5f2d05530645e03506e654838e84921d6
SHA18c8c173758e78de9213fb17b7a452487fe901182
SHA2565034466af9930bf116f209764bd523fbe538e2fbc7b154506e76aeac8244ccfc
SHA512c6dbf3d79fafc714b139b5ba8465551d59a7852a7c8a53f8d950571f4be0bf405ffcdd1e96c3dc7adae1a0d210bd128f37dfbab648f7e8aff0f054d6f82fbd64
-
Filesize
109KB
MD5cde06ba92338d64a8c747438a082da9a
SHA19a2b797aca0c9261586cf8a7b9c6eb9c0a231a27
SHA2560a487e29dce7c4b44852c8ef764b7eb1bf94cd01d1a3dff4f6c7ce1933fe13cd
SHA51203b76c79b990e5fdad42ae9232cffc3d6fbcb3c7653d0335d8932ff23787e3d17a9d5eb9ba97846dc24a83679103b7f854ec3420798fad94862a0118e03c3a2a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd