Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 12:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fanuode.en.alibaba.com
Resource
win7-20231020-en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467714972765236" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1791582586-1997866593-3795608343-1000\{46F55367-51E5-479E-92F9-02B37F8E27BF} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 5096 4992 chrome.exe 24 PID 4992 wrote to memory of 5096 4992 chrome.exe 24 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4196 4992 chrome.exe 95 PID 4992 wrote to memory of 4756 4992 chrome.exe 91 PID 4992 wrote to memory of 4756 4992 chrome.exe 91 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90 PID 4992 wrote to memory of 752 4992 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://fanuode.en.alibaba.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffaba799758,0x7ffaba799768,0x7ffaba7997782⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:22⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4952 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:82⤵
- Modifies registry class
PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4940 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 --field-trial-handle=1860,i,1617463007469228279,18179659924777884475,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD5639a61560d16e903c2537b21422dcb65
SHA1ddd5b76bd44df4db31a2980134a8c8a9cac10d28
SHA2563b7616db153d1560e9fc2a982bec39e7666d37132f4861b1ed18ff71ee084c97
SHA5122fa5e3b495c4fa0660a05aad11f8eec2ae4bd88c43b6c52756fc0ff893e6dbd19e30b8fce10b3d6b95837bd0085e0d15809dbd1dcbcc855d9a359d0ef0c0add1
-
Filesize
3KB
MD504a29cf2f4b884cb49015ab7ef10afff
SHA1cb74104f77b292f276bdf7485cd18b98a8b8b3e7
SHA25606cc6495c4d91c333bda4c2f7d487c4eec3f405b4693240f6b062cb11f2d9b51
SHA5129b91e4c3baed99d391600203d7103a18c1b0b0f1bb8b5852f9a16658f084f62164b1122987a50178972845f7ecab535cd869c4b50b870632f593617df53f2036
-
Filesize
2KB
MD55d29f34253ac60724a0bd877901b6a6d
SHA12a464c67fd7b88ac184cfbcfab0099b0c30ea211
SHA256c8e0ef91242c2bfc3ee4e0adca6b49e9bf5b66326985dbdc9ae395c05c316587
SHA512d929ad2eab0106934fa10c11e66c6b8fde967d2febe073c96c7edd52c294a0a0c457beef70c71d54ce3c4b690e3c494a58b7996dfc1e3d00be951049978ed7bb
-
Filesize
2KB
MD5f797e3b47f56ab28a1d4e642ab6a8ca5
SHA18bb8e6c5eaee8f0782f9ac76f1c2c7c2ff0a4ea5
SHA2564bfc064275e7f593df0649c0e4b2882538ce6b4fecf80f6f698c31098182c4eb
SHA51240e4c9c7f5f87097dc2cf46db3da92582429725d95befba2f19129ed044f4dbac4898687029c581c566cc9918dad166565e96900b419eb1c5273def9976c5891
-
Filesize
2KB
MD5c5ef4c84f72cb7818f69ee5dee2ae204
SHA1168f2e9784f31f560893a97e8cf2b285fa71aaec
SHA2565d04c7a865fb72d7df9391ba4dfa605ba9d2d8cefd5f61c3caf0c03b19f14be3
SHA512cbc409d693cebabc1fc52e665c1565b546f1e6dbf094faf9d5ecd9c6af99626a1c9fd41d25c92406c9e4f88b2abf928b8dc127b2a8312ff133fd2b5d288a096b
-
Filesize
6KB
MD56930f4d4f28f7fe8a133c36311c02c82
SHA1882bf58642d4871fc175ab338a9d3b32721a2b4a
SHA2563ed5ba7724cce9d954b551ce5d4121545a62d55e1a0eb8a9f7f87c604379dd71
SHA512eeecdbaa48572ef87aa2310f75b9dbbc98b98ea53b9030c8656fc23b7da3385a1fd90fc96c93f4896cf949cbd01e432d2044d2cc940746fda7890e21c9f07412
-
Filesize
115KB
MD59b61f34d4dfa194ec187ade7d1ef4c2f
SHA1fb3d0562f630e2b1a948b20e7460617e6e896768
SHA256983735b16ebf1d0009b1e290e001f7b980e256bfb71cf43bd98dd1c3cea572f5
SHA51250933da9b26817410f34f080999cd1c344c1e3466b099acba259ec280a8fb502fc1ba71c1985e803fc3df3505c1547c4516edfe505b8f145e3b1c961e60d8df1