Analysis
-
max time kernel
93s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2023 09:42
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133458109967939387" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 888 chrome.exe 888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 888 chrome.exe 888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exe7zG.exedescription pid process Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeRestorePrivilege 3368 7zG.exe Token: 35 3368 7zG.exe Token: SeSecurityPrivilege 3368 7zG.exe Token: SeSecurityPrivilege 3368 7zG.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
chrome.exe7zG.exe7zG.exepid process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 3368 7zG.exe 1588 7zG.exe 888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 888 wrote to memory of 2488 888 chrome.exe chrome.exe PID 888 wrote to memory of 2488 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 2980 888 chrome.exe chrome.exe PID 888 wrote to memory of 4724 888 chrome.exe chrome.exe PID 888 wrote to memory of 4724 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe PID 888 wrote to memory of 2712 888 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://doctor-fateev.ru/NEFT%20RECEIPT.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdae889758,0x7ffdae889768,0x7ffdae8897782⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1876,i,15028720852974585422,15417051297926379084,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5048
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\NEFT RECEIPT\" -spe -an -ai#7zMap22716:86:7zEvent184461⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3368
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\NEFT RECEIPT\NEFT RECEIPT\" -spe -an -ai#7zMap14848:112:7zEvent222761⤵
- Suspicious use of FindShellTrayWindow
PID:1588
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\NEFT RECEIPT\NEFT RECEIPT\NEFT RECEIPT.bat"1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a7ab23614dd38fa522c652fc8e15adec
SHA10210738172b7fd28b4dd31da81cc7e0a1dd8507e
SHA2569ddc7bb1f81181d12b651f80354d4b6fe716c451a2bea3f25f816a117a72fcb4
SHA51299e2f03d1af43e9b99377c2dbc4531e47fea5081ba7eddbef82205a01c48bea15b26c271b5e49a7bd8cb2f2ec55f4c0d25cf5ba69ef150c920f9f38d1fc20b8d
-
Filesize
6KB
MD501369a3d4ba57260ff79bbc93b17d51b
SHA183598e5702f9b1f72e8949d64ea7a6403c1871c3
SHA256a3a5eb1bc97e60cceffcd916dd1cbee89b4edc9a8ddf99c9e03d2861c1731150
SHA512d530d9552bdfd175a319415221737637436cfe3d1ceb78a0820949ffafe53c751a34280123e188789164f899d67a480e261b2ba646c160688830d0c3965c9488
-
Filesize
115KB
MD5372f88339fa36939f890550f905d9f65
SHA1c5f27d8c8bce556d190aaa957fe83bb0e309b8c2
SHA25653158a567910009eb84eb7d02f1b61fe6f51f67e8e3b17ecb83d64ca3e79fbb9
SHA51286d1bc6da60d8b6cc98607f5b3c1e02406fffe2a59db0bc68d4fe39528fd8dce5e67beba19eabb4ac547e6d1bbd1101ad1624c84bdaa77d304eac4a808eb4b50
-
Filesize
115KB
MD580d50fb282b3773e6d6bf0ad845acf33
SHA12024bd562bfa1b16338b1c0ebbf007ba3077a1d6
SHA256759090c4a98cad064db8fb558c9d8f329e95f3cfad36fbfa42c425193a963c4a
SHA512a23695dd57a2335e7880948f2c03faa046c268b04627986ed0b5fb92cd3c9e76ec64fca5fd17ed94a9a03169685ab33ab93c17bd3174c9ad1682536f7f4657b7
-
Filesize
264KB
MD5a3dd7b0d489a48df2e3dc2659e4cd901
SHA1a736186bc3e1c04d155870695b72bd933181031a
SHA2569eee8244b4d94f96a11bc4e2987f0f66eb4d917e04ad710686d5efe6f6ee9e97
SHA5127fd19529a717d041f513021e8827440561e1676990c5aef4f2a0acde95a3e1965e6e4e5f16149e6afbac4c84ee25a30f3a80c4c3c568f1bc6ef21b3bb9db47d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.1MB
MD5d259d10134ce1f45df757051b2b1accb
SHA1c4c4260ae42e0522fab0d5696631fcfc0a2c665a
SHA2563e32fbdd6075589abb8619e1b1a95058a01d62750525dae10a89ea8112e16e0b
SHA5127c2df714593559bb417b7d95dc525ea096d8e49764ffb59b26e438ab65a3f467c8868db561100df21c0ca85a0559138ee304146bb433fd2b6d101cc7c3b1c34a
-
Filesize
2.1MB
MD543bfb670cfff87ffdb8febd6da7513fb
SHA1a232eea674cda0f71751eff2a6571a8e9602d2a7
SHA256dec7a59afa017490684a8f597635acdbe964762612f6924bd5f2361605ada714
SHA5122dd21b31186799592905f1371b32b0dad0f3363ed6af50895503fc30fffb0ef6541fff84782f1277bf2f3f658d180fda8376166f5c758d97557469005dc1aba7
-
Filesize
2.4MB
MD55ee81a84ebf389055aa233770b09a710
SHA145fe4367dd86f888a70e0c82b899a6602596bfff
SHA2560ee72014a5767e3f99297e27fb4cd66fd8cbdf8577e494e9eb6aea61d4194626
SHA5129208ea252f5d899fb7337052892175241bb2fa9c4943113f6731cccabb2a36dd94a44299b2e207fa760df303b53171af309a7c00580bfa0b7f67896054eb54f8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e