Resubmissions
15-01-2024 13:16
240115-qhxnjsgdgk 102-01-2024 07:45
240102-jlpzjsgdg8 801-01-2024 19:34
240101-x93gfagcaj 101-01-2024 19:21
240101-x2y42saff3 601-01-2024 12:16
240101-pfkqjaafan 631-12-2023 10:47
231231-mvqh8ahdb5 129-12-2023 09:34
231229-lj6wdsgch5 628-12-2023 06:08
231228-gv5p9adaeq 128-12-2023 05:48
231228-ghrmvsahal 728-12-2023 05:47
231228-ghbawaagel 1Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 06:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win10v2004-20231215-en
General
-
Target
https://github.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133482173909362603" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3588 4120 chrome.exe 37 PID 4120 wrote to memory of 3588 4120 chrome.exe 37 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 3888 4120 chrome.exe 90 PID 4120 wrote to memory of 4104 4120 chrome.exe 91 PID 4120 wrote to memory of 4104 4120 chrome.exe 91 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92 PID 4120 wrote to memory of 4352 4120 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb7829758,0x7ffbb7829768,0x7ffbb78297782⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:22⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:82⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4828 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1816,i,2628282094872648483,8943990923269529594,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5242bb31a51ba66cc070ac289f3bb247e
SHA13d9415c9745e6d8d6175565bbd699fb3df7c8823
SHA25602692d674a8cc1c436683c80042e967edce7fd3a7a89cb513f2b069ffa081e49
SHA51221a016a67cc7ab55654a728f3a1d6c52cb18ac9ddfa6e79ca636db79192b8ce1a5440ed7d09d6ff42e670fc11e33bc4ae03c3465a89b316ef41d97cac5ea8605
-
Filesize
1KB
MD56ed32b502265c4551515bb3b9e21a715
SHA196f3cff89b54dfab92937992b4986684f9263325
SHA2568f4da8cbe8a6106148357c3cffa2d189230db80f4cc883452268d349939b016f
SHA51284fa86a322406703276513c420ed989b115288b3a0761e8769baaa782bec9c0e4eb38c967dd9f8f95b456648800654bfb44b2cc8e7b682d3d3d7a8fadef60d6e
-
Filesize
704B
MD5258e6fa19158ea01d21f79adb7b9e73c
SHA196021cbcbec9a14ae75f5e0d6dd7753dfe3da12a
SHA256a31ce0d338f3a386783a5fd7967e63f6c62050f7e1d6c6758705f5510eeb37e3
SHA51293579a245446683051710b5b4b39b83b4c9b55358ef9c51e93e6cb6d50eb0ba37d4d0dc742348557f0a1afc0463b671114f40c221998561b94bf395cfe3df0d7
-
Filesize
1KB
MD5135f0f9a714746a6e7bb4752825acba5
SHA10565d7424f9798ef262d0774c3c4a217137c5304
SHA256c766eca16722512305f2ae09575b44f2680f6a6a73e362148e911d541bc347be
SHA512be7072dd7edb16f370c7cd2ff80c4304b525c121c53987937ed3474603ca0ba680cc2221e6e75ad3333994aac83a12d872538e6badc11176ce737b9ebf2e4148
-
Filesize
6KB
MD5590d19f4642b08087e3d573a36d57bbf
SHA144ebb2bbbddc31ae92dfdc1400825532147f1b35
SHA2569907c9271643e70acaedaaf4f90550c82131ca4344c7bfbb0f0ede779c90f4b9
SHA512c0326ad8125a4c93b43c671a1a30e30abd3a0112c4faea040e94ab4e4669453af70c1528490139f44355dc44b584b8828f0cbcf5518ad28d17b7b3c0868477f6
-
Filesize
114KB
MD5dc369f755b909cbcfa719d8ab4899aed
SHA1bf33b3ddb6b72e84df9e51435a06bb3c388dc48f
SHA256c30790948af679c140fc0597a14cfb6adac4b427b08130068049a749a36f1a37
SHA5126e15f7da3c4f696e3d9cad9fde211e4233cca0c747e4a17c1038e42b61452df44dfd62802b8298920d85522faab942de509a40c13a6779a4a3d8c29aff7893f5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd