Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 07:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myitinerery.xyz/cx92/#jwt60521t2
Resource
win10v2004-20231130-en
General
-
Target
https://myitinerery.xyz/cx92/#jwt60521t2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468408148043632" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 460 2400 chrome.exe 86 PID 2400 wrote to memory of 460 2400 chrome.exe 86 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 3104 2400 chrome.exe 91 PID 2400 wrote to memory of 208 2400 chrome.exe 93 PID 2400 wrote to memory of 208 2400 chrome.exe 93 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92 PID 2400 wrote to memory of 2760 2400 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://myitinerery.xyz/cx92/#jwt60521t21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa4189758,0x7fffa4189768,0x7fffa41897782⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:22⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4900 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3220 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4976 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2300 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5072 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3092 --field-trial-handle=1868,i,11533335028348346356,1706870717016540379,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58074098dd21410292cd5c02662a81a26
SHA102677fdf9a81ba054798d3bf19ebba1cce83985f
SHA2561cedf21b60050b955b4932af80374e9e0745d97456ac714db9ebd2a80d0ad3c5
SHA512c534d71685bac1cc9cfd135c119e7b3535e98d337bf77523786e1b9b71aad71a747f69602f7fbf8b6b1f5624dd87ec9f25aef706636cfd1d46ff002dd53d4605
-
Filesize
6KB
MD57910ecd3dc01251d0febe4dfa9541188
SHA1881c97ce95a1d347f453e85ed7fbbe7ad8a95a90
SHA256c1d3224f946ff557ea40d2fe174cd42a8f15074a8e50c4377eaf6fba17006938
SHA5123df27c2502a2cf1fd7906d48111a258cc0c3dd4ffc64a53811d6f6e9d47137fde29605e1f7a2a39f0890c8cd15fbacf4c3d1c0a264649a4bb36c757cf95b3806
-
Filesize
115KB
MD58f4335365f72b68684abfe09790f73e3
SHA14db495d59cc52948bb4c2870c61c715b8b910888
SHA256c3bb6fabb3212a316e7b62b9f679d17cc16d98c379214f45acaad574f302222f
SHA512c4d8659247de659bbc258fbee1c07226e7a9b0223d1ce81913cd8fa3995934ce289652415b11653464651fa80b7268102020dac8c1c9092698772f8f165ea8d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd