Analysis
-
max time kernel
0s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 03:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yourlovewave.life/?u=5tlpgeu&o=gqkkqz2
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://yourlovewave.life/?u=5tlpgeu&o=gqkkqz2
Resource
win10v2004-20231215-en
General
-
Target
https://yourlovewave.life/?u=5tlpgeu&o=gqkkqz2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1564 1708 chrome.exe 14 PID 1708 wrote to memory of 1564 1708 chrome.exe 14 PID 1708 wrote to memory of 1564 1708 chrome.exe 14 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2652 1708 chrome.exe 23 PID 1708 wrote to memory of 2988 1708 chrome.exe 22 PID 1708 wrote to memory of 2988 1708 chrome.exe 22 PID 1708 wrote to memory of 2988 1708 chrome.exe 22 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18 PID 1708 wrote to memory of 2780 1708 chrome.exe 18
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6539758,0x7fef6539768,0x7fef65397781⤵PID:1564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://yourlovewave.life/?u=5tlpgeu&o=gqkkqz21⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:22⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3444 --field-trial-handle=1388,i,11570640139495456406,15857032303789577068,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571aa68571140b5f7aad0433c430b2b6c
SHA18597a042ca3a5cfc1ba4d4eae99f7e4cd6176e8f
SHA2569a356428b14394bf705312303b919585412873142a0be76b76395b4d4a577488
SHA512271e7f4eb29efba310e3cd4e4f18e0b389c1ab69894f90f27a037915ba447c0f2322e045d3b39339207fac89191a4ab315c4b6d143ea73c456598164b721a319
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
169KB
MD50ee4f254eb3eb50518528890f1f08828
SHA18a2f3deaa18d4aa61cda0d7a67c84b4d439fea48
SHA25621d7caec38413c8916396bfdbdab198413186592908ddee7ed8f487a93ad1e12
SHA512008a6ab81cf618821c8b2f92e6fc92f4307431ec2a6a57674239b9b2115a776fdcaf8a20edbdabad40c049853745313dfc6253dbc81ff3efb8cb5dc2e8086967
-
Filesize
5KB
MD5e17fcdbf9417a55fab8ba5bb8e72484e
SHA113b0be8986611725471eb35871624a81a2c252c1
SHA25691a21320b2a596885a4dff857874216446fe7012bb63cdf9d18338ecbe600787
SHA5127237869f5a9a4242e0f56eaa31cf4c1bc175c72e7a70e7c6a60e01b9b447c93f0f82028365532a4c8c5cf6f3490c3353578557bea1c5f664c2674f9374fb5c4b
-
Filesize
5KB
MD5c39a4b29c623ecb1942aec28a400f317
SHA1d00ae6d03c8ea6c18a5502a8ef79541b4bc30a71
SHA256fa1e154ad6272e13bac46ba03b5d99787c0daee3d806cc09df6c10ffe38d9535
SHA512292781f5ff027b964b849371124b7942bafc86d820c25175a9cbdc2e7aab0cc0ef8d00f441678b977b47d1f7c6027123ca1c0b5dfb42a0f35e9b7cbebe5ae3a4
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
18KB
MD58952ab88f9e0cd5437a4c7b826ba1f0d
SHA17e8110e103ded12c8d2d8c1f1be48889e3eda38b
SHA256537e76f861149528cb3f30ba025d172d3e8780d2eb03b69dec97ece4de431991
SHA5127db2d3bda375b4f40d6117509569ed965fe021a342b32864323076d231acd1e2be693b61d87f918170ca4027d4b2413e2ecc38ea66c32aa0cdc92eee5eab2282
-
Filesize
100KB
MD58530df5e6cfca2c2a97f81ac578ec22d
SHA17354ce6035ade31a7abb4920e9fb0b56f69d7c5e
SHA2568d847f2eab07facf4f500dfa41e639c93c2b667082de8974e8bf61b2128969bc
SHA512516d28682ad68c6df422d91b16988d63c4927534e038120099bb287ed091d1dbc4556fe2858cede410c3f2bfebd08bc41e8ecc413630a70ba929151a9e930fd6