Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 09:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://froward-materialism-fe7807c32458.herokuapp.com/+?y=49ii4eh26oqjcp1k70p34o9hc8q32cpg60o32d1gcgrjgd92
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
https://froward-materialism-fe7807c32458.herokuapp.com/+?y=49ii4eh26oqjcp1k70p34o9hc8q32cpg60o32d1gcgrjgd92
Resource
win10v2004-20231130-en
General
-
Target
https://froward-materialism-fe7807c32458.herokuapp.com/+?y=49ii4eh26oqjcp1k70p34o9hc8q32cpg60o32d1gcgrjgd92
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467592736375204" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4032 chrome.exe 4032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 5068 4748 chrome.exe 87 PID 4748 wrote to memory of 5068 4748 chrome.exe 87 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 4004 4748 chrome.exe 91 PID 4748 wrote to memory of 3776 4748 chrome.exe 92 PID 4748 wrote to memory of 3776 4748 chrome.exe 92 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93 PID 4748 wrote to memory of 3424 4748 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://froward-materialism-fe7807c32458.herokuapp.com/+?y=49ii4eh26oqjcp1k70p34o9hc8q32cpg60o32d1gcgrjgd921⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb07d9758,0x7ffeb07d9768,0x7ffeb07d97782⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:22⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4616 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 --field-trial-handle=1864,i,7001248522579442068,5048441983658201543,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a815533ff3e8a6d12093b91564749170
SHA1195e8bbb73afcc699866eba1f3815c68dde2304c
SHA256f48baa13da11ec10b68ca7ccdca75e8327699ab7b998e09b8bcbb55426a8a77a
SHA512a6ef9525e2310f01efa61f3e58a2d2a3a141e25996aa2b2f1558d5bdb46d1b8af51c7f4ebfd32e23462c9b37a177b2b575645bc28f0bc2afaad596c98146909d
-
Filesize
1KB
MD5a65d96d42f4e98b4de9336d41dd33d1f
SHA13eaeed6e64a2d2d5e2e480ffbbb2ab551a3979ba
SHA256ebbaab7e4d13079d2b8d0830b8a3bb16d7ac89dbc975706c139c1eedb9870985
SHA512738aa9dd5074d741b10aa5b3f1d4e454766ad9b8dde2558bd58140b7c3f22783eb8702dbb97520a8986fe8de4d39a4d69190fc6e8247aa979121f84872d1f4a0
-
Filesize
539B
MD582179fcbc405f1d12568087b5ce1610e
SHA1083888f7255261684e6f657e9961c34a17d83514
SHA256a0a6b31db5884128ad1de64c0502169aaae014de8185bd255a92bfaf1d80850a
SHA512f8b19e039924fde54b52babd92e653dffd1618b0786a4cd2b8a64ca41c61dbe4ae8e72cc1c089fe9eb649cb3c9b9d2add5b7d7bf390d99ecd6fdf279c450c4cd
-
Filesize
6KB
MD503dda7e21542c0888eec478b563e82e1
SHA156c8050a31e1f38024a3430a530eeaf8d93f3b5a
SHA256a42088f191587930385a41d948087ecaf446a6592c4ff6149326c3f04d523587
SHA51213ddb7a0a070a1845c26e5df5c87ab122d1812ee43302ea4ecbb50d187cadb010716cca1602649e37aae4fc07a2503d5968f48766b58c43c22279f8927f79e7d
-
Filesize
115KB
MD5232eed8d4aa51b0bc103e4da0d429971
SHA14dabe6bcec27eb7a99d9541f7a0e99a0b26540ec
SHA256722cd1d11357667f7dd777c9c407f95ce2ad90d12718d2f1c37406f31e1bfcb2
SHA512b958abe89a6292eb402f639b68a1f8f330b3e152a150bd984cdee04a847343dce6002a4f22f877486d969af0471f1a3a1dbb426cfe4729668227344a9a631c50
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd