Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 11:46
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.playlistregister.com/fg/online/verify/[email protected]&ui=vlmtx8ugw5yu-vlmtx8ugw5yu-vlmtx8ugw5yu
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
https://www.playlistregister.com/fg/online/verify/[email protected]&ui=vlmtx8ugw5yu-vlmtx8ugw5yu-vlmtx8ugw5yu
Resource
win10v2004-20231127-en
General
-
Target
https://www.playlistregister.com/fg/online/verify/[email protected]&ui=vlmtx8ugw5yu-vlmtx8ugw5yu-vlmtx8ugw5yu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468552243296201" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1072 2796 chrome.exe 88 PID 2796 wrote to memory of 1072 2796 chrome.exe 88 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 4808 2796 chrome.exe 90 PID 2796 wrote to memory of 2224 2796 chrome.exe 91 PID 2796 wrote to memory of 2224 2796 chrome.exe 91 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92 PID 2796 wrote to memory of 3720 2796 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.playlistregister.com/fg/online/verify/[email protected]&ui=vlmtx8ugw5yu-vlmtx8ugw5yu-vlmtx8ugw5yu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4e909758,0x7ffc4e909768,0x7ffc4e9097782⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:22⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3824 --field-trial-handle=1864,i,13912847531833341689,14596166559025660603,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD539faf8d2e1ef2d6e7c8a600415678c12
SHA14583912132f37ba273b0dfdde14a0d99e38a3b13
SHA256e345361a8ae55beef0b2f9d087f92863f242232f3e77e430fa7ee969abd2f4f1
SHA51264c09534e76162b544c0cb68bcf75bee92a769aa9ba8da9780236409f126e3e64ab5930a5b21c871acbbc78d138bbf81b56f69b2dfdc9ba97b29658aa691e769
-
Filesize
1KB
MD5d96d50bcb17c069c40c2b7403de73328
SHA121b5e78cc918183be197f0bb3c8bb54a3780a31f
SHA25645500b64ad012e727b980b6b8d3e9293411bbde386a9b6697ecf1d136fe056c3
SHA5125642f2205c237463cc59387149f3a57fc303141745d25f8fea95b5e2099a804b57eb0c0c5c7a9c1b33440a9028874d07c655f900ded126c27dfe385606762e0f
-
Filesize
6KB
MD5607e931c160229d1977d3cea266d7221
SHA112593c1cd35b0586207855d7ee634ae5100b38ff
SHA2565df4802e430e39df1e03917b03d58f6b64427a0a8c0fc8cfd895a699b1576613
SHA512267a280b9a87828e90b0ca7f8e7012c2d8392c4f05df82341878373b497f6b851c3be36019faf587b7262d6475cff8432da97a76cd345a385dca304233247736
-
Filesize
115KB
MD56ad190723caa8bb913063b72f75a8b36
SHA1ddf4a920d179deb8f5c6f7829a0e5b8a97dab291
SHA25688f761832abafdc92f07de63c7e079c208940b75d9b13dfb161c2320267d26c4
SHA51247fd328b86e14e2c9b48ad18ed30f30f29eb1368c795cee1f3d3d01ce644822925eac7955f636bd8eb99513b70682f7bee9d047262f4c5a5a97f9947d0764827
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd