Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 04:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ec2-44-230-127-50.us-west-2.compute.amazonaws.com/F9y6-v3HrB2jCS8zN8W8V_5ZeOJS3RRG_SIKdhKxD_7tc_ywT99i9UdLf0eLCeH3HGCQSbzCnO20F05jbaKNX-BDNDWW2lcA78b-NLnt-B-4X07tpNz5H9kZXgnxiFTHp6N6tQCAkfdW6vvfB6WOP_zU_FomfFl80sNf5FOWBiAajgmicX7OKsOfL9
Resource
win10v2004-20231023-en
General
-
Target
http://ec2-44-230-127-50.us-west-2.compute.amazonaws.com/F9y6-v3HrB2jCS8zN8W8V_5ZeOJS3RRG_SIKdhKxD_7tc_ywT99i9UdLf0eLCeH3HGCQSbzCnO20F05jbaKNX-BDNDWW2lcA78b-NLnt-B-4X07tpNz5H9kZXgnxiFTHp6N6tQCAkfdW6vvfB6WOP_zU_FomfFl80sNf5FOWBiAajgmicX7OKsOfL9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133455330470422468" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1840 2196 chrome.exe 83 PID 2196 wrote to memory of 1840 2196 chrome.exe 83 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 1760 2196 chrome.exe 87 PID 2196 wrote to memory of 2744 2196 chrome.exe 91 PID 2196 wrote to memory of 2744 2196 chrome.exe 91 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88 PID 2196 wrote to memory of 3844 2196 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ec2-44-230-127-50.us-west-2.compute.amazonaws.com/F9y6-v3HrB2jCS8zN8W8V_5ZeOJS3RRG_SIKdhKxD_7tc_ywT99i9UdLf0eLCeH3HGCQSbzCnO20F05jbaKNX-BDNDWW2lcA78b-NLnt-B-4X07tpNz5H9kZXgnxiFTHp6N6tQCAkfdW6vvfB6WOP_zU_FomfFl80sNf5FOWBiAajgmicX7OKsOfL91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff904c69758,0x7ff904c69768,0x7ff904c697782⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:22⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1796,i,930369452926021718,7166880913484480817,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD535c9e5eecfc54739a1c561e82ae73335
SHA1dfa62f9396650237223aea5e2cdba793a9a23c62
SHA256f75181c16c155601bdb8fe81f7c3dc55bd0e01b059fff5502081766a7e81d6dc
SHA5125ca5ac26844c223ef86e73f4ca9cd6e8a240d9357be953e22dfb6e0599496a43bbb995908b6266680d178e8b24ef896b4a12d8c9f78b83826254f1e81f7d9eb8
-
Filesize
1KB
MD5f0c66ce68d7b834bdb6cf51defdb89c2
SHA1729d045be1aab8df88100de253d069b8cf98aef2
SHA2565420de089c1c7ac3506c94585aaa64838cc9977b3b0808d1be3dd84d8e99fe45
SHA5120261a0153baf7fd4ddcf3fddfefec2ee6e923032a62bee3f4f9393406a212c57f8cd45d5ca840c80e19753d05c6e13915e62739f60a519bc96831c85084a3a26
-
Filesize
6KB
MD58a4dfe724830342dd4a9b9abe126c485
SHA1e4ad7e64b6ab46d501a797b9b8d0d48919761829
SHA2567b200291f893a2ff64ab6b4bdfa6f1e2b5476af68d3445f49e09d7c1055e040b
SHA5122c5cf6d7236b3b5c1135be8f6ebc761ba7a41787b420758d0e011a3825f56146b57eff2666997858e9ab724c3b0b603746bb0140546defb736af7001bcbc3198
-
Filesize
109KB
MD5d44869e534ef286ac8a9e1ae88525ba3
SHA1cc8d63a427cf424410427802a2462c9fad2bb7b2
SHA2565ee33fbe658f08eba65f88330bd9befb0d5d16419313478b12af92dface7228a
SHA51269c2ada59a3b4c5395c141e59283226b4630c3d252b72c8fc073e3a1dbbfaf49f707de714b27236d011e9b612f276cc367e099743681095e68f618d71e74ceff
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd