Analysis
-
max time kernel
0s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 01:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/url?rct=j&sa=t&url=https://compaslim.pl/new/xjsaqjxrrgyoksp&ct=ga&cd=CAEYAioUMTUyNDcyNDUwNTk1NDY2MDE2OTAyGjkxM2QwMjcwY2ZkMDBmMWM6Y29tOmVuOlVT&usg=AOvVaw2n-7WxTBIvF5ap6xLQc3vZ
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.google.com/url?rct=j&sa=t&url=https://compaslim.pl/new/xjsaqjxrrgyoksp&ct=ga&cd=CAEYAioUMTUyNDcyNDUwNTk1NDY2MDE2OTAyGjkxM2QwMjcwY2ZkMDBmMWM6Y29tOmVuOlVT&usg=AOvVaw2n-7WxTBIvF5ap6xLQc3vZ
Resource
win10v2004-20231215-en
General
-
Target
https://www.google.com/url?rct=j&sa=t&url=https://compaslim.pl/new/xjsaqjxrrgyoksp&ct=ga&cd=CAEYAioUMTUyNDcyNDUwNTk1NDY2MDE2OTAyGjkxM2QwMjcwY2ZkMDBmMWM6Y29tOmVuOlVT&usg=AOvVaw2n-7WxTBIvF5ap6xLQc3vZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4456 5000 chrome.exe 16 PID 5000 wrote to memory of 4456 5000 chrome.exe 16 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3784 5000 chrome.exe 32 PID 5000 wrote to memory of 3392 5000 chrome.exe 30 PID 5000 wrote to memory of 3392 5000 chrome.exe 30 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25 PID 5000 wrote to memory of 1480 5000 chrome.exe 25
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/url?rct=j&sa=t&url=https://compaslim.pl/new/xjsaqjxrrgyoksp&ct=ga&cd=CAEYAioUMTUyNDcyNDUwNTk1NDY2MDE2OTAyGjkxM2QwMjcwY2ZkMDBmMWM6Y29tOmVuOlVT&usg=AOvVaw2n-7WxTBIvF5ap6xLQc3vZ1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x10c,0x110,0x114,0xdc,0xe0,0x7fffe7699758,0x7fffe7699768,0x7fffe76997782⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:22⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2812 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3164 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 --field-trial-handle=1860,i,8655009269359879955,14951695619783954175,131072 /prefetch:22⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5dd0891e7c82e97f5e6c5ff47a38df8c5
SHA1f7b0c6e07ff66b74f41162fd423a8e9f42227c24
SHA25625a3c50ebeaa44945a297585c6fc4fe7bac4da9359f1d20100a8f3e9f47a6608
SHA5125552aa4a2db2f92166af33a3609934fc97a01b2830ca55c1f6a911451fc4670721d1666e09055397ea9b54d554f72d43f735f71b1d55411ceb151dfae6461416
-
Filesize
1KB
MD5423d5fca5f78e1176c64fbc2efcbaf3e
SHA1b6728ba1d39fc9b65f97e533482055d0968881e8
SHA2567ba0753a20e6fb39a047b0ebd880bcc4769bd66cc8c66e260e5c0c34bba30de2
SHA51277d7bdf41a2b5575a8c69df8e143bab74c2e7b5eba8b57735b45c31b5e5f9858d076083e00813c9b79aca62da42633cc2cb17a7598f7f824796c73aea043f75d
-
Filesize
7KB
MD52f603ef9731350dccb47c6a681bf71e2
SHA177cb4d23bcd7a5578db3c314a2125207a3a4f75e
SHA256eaa6a86c4956d3ca6dd8cf18c294a0a094753c965d8f8be1918b1cd571b71ded
SHA5128f4dfb89ebab1e13d8b3bb8120785ab96691556695c9795adf08fe00567f37dfa55eb6cbc89adef85c734747160c0b2c5b746dace3a1da21283acd70526325c7
-
Filesize
51KB
MD5bb896cf1b0bc93917d4a3f23fb068c8b
SHA1899dd82ef047f55cd22b4c015ba86e7dd071457e
SHA256f574e62fbeac77e98f1df65116b3b09e919ec21b8662a0052a05326939396bcd
SHA512f12d838c322a5d1a2416d0e3832b01a83a9991633abeff3d14d16892876b7d7edd7d9659bf434ff22a8ab688bef5842a4ed24cee01d977a18fc1ece2b8eecf9c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd