Analysis
-
max time kernel
599s -
max time network
543s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2023 04:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://122.161.50.23
Resource
win10v2004-20231020-en
General
-
Target
http://122.161.50.23
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133455328437476188" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4660 4392 chrome.exe 38 PID 4392 wrote to memory of 4660 4392 chrome.exe 38 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 5036 4392 chrome.exe 87 PID 4392 wrote to memory of 3404 4392 chrome.exe 91 PID 4392 wrote to memory of 3404 4392 chrome.exe 91 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88 PID 4392 wrote to memory of 2268 4392 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://122.161.50.231⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d6a9758,0x7ffe0d6a9768,0x7ffe0d6a97782⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:22⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5104 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3300 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3928 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3812 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3308 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4012 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3312 --field-trial-handle=1768,i,1171639215071386842,65749336322543433,131072 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5588059721227d8f5778b725762315be2
SHA1d7fc2f0a7aeb55c6ed0e3a724924ec2c2f33d428
SHA25652ab7613d56db1be85062d4560581a5fae66ae0f79514bb6f56049490f6da366
SHA512573bedcd67ded531359f0fbea75f91bda44d6805c2243ec7f2aecca2eaa0e65fed9a599ddecb9dd6cb8bf34c0a1735727255dcff31d4016221eae6808447b5d8
-
Filesize
6KB
MD573663240e13dce173fcbb4ead1f0997d
SHA1b54e7d2faade85867396dfedc9658b21ee489771
SHA256352317cdc3a6e9a8830e3a2e2db382252f77c87201155d4bb8f962755fdcb1c8
SHA51221f4c8104471eb3e7cdc8c210982908a6547171b60fcd9935127095cac45ed021164308a845c4a5962a6d70486750eead081de149c1b91980f902ac1f82a1939
-
Filesize
6KB
MD5df9c54b6d5a65013d338c8e3f1429b9a
SHA1948a25ff62852929b526e97703eb632dd0616f69
SHA25614add78b44b5a0136f59250066b43438caa6be111135e19833ebdc92e57b5c62
SHA5123fba7a3d7847c533a36ee835d84f0d709e30dcbbf662b3bb26125c8e9d03990ce59faebe847f6d42a24ec736d01deefc169e583185fd853494a3b5715166316f
-
Filesize
109KB
MD50ec3716f48d0d3c9832438165239c514
SHA1f9d515f5822e0e7ba33b7a2c103e3a860b2c3873
SHA256c3fd433913afb6f3cc16ec9b2d95cc45fe5c2a1273549a9f8c7a82171b03fb6a
SHA5124200369f64a7094cee737b66bb96a35242b65431aac2ad2793efaf9a0f02fb3f03ae7e9db55f7f3a076198b98a736734bbf9fe575792cbb2667f7ca824eb4a8b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd