Resubmissions
31-12-2023 01:35
231231-bzx83segbp 1Analysis
-
max time kernel
24s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.ihateannoyingorange.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.ihateannoyingorange.com
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
http://www.ihateannoyingorange.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
http://www.ihateannoyingorange.com
Resource
win11-20231215-en
General
-
Target
http://www.ihateannoyingorange.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2232 1732 chrome.exe 28 PID 1732 wrote to memory of 2232 1732 chrome.exe 28 PID 1732 wrote to memory of 2232 1732 chrome.exe 28 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2712 1732 chrome.exe 30 PID 1732 wrote to memory of 2792 1732 chrome.exe 31 PID 1732 wrote to memory of 2792 1732 chrome.exe 31 PID 1732 wrote to memory of 2792 1732 chrome.exe 31 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32 PID 1732 wrote to memory of 2812 1732 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.ihateannoyingorange.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e39758,0x7fef6e39768,0x7fef6e397782⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:22⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1380 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:22⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3220 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2728 --field-trial-handle=1176,i,11735855502997257282,12776143774053688479,131072 /prefetch:12⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59119abf02b6a76560755c32a858fc9e6
SHA119da2158c095a57019c9fcf20978e868575c8f52
SHA2565af8a1d880914545209fffd87a572d4a54d65e10e7638aa6b651a306654f076f
SHA512b776c35b4d9c3b5edeb0de3a1bb175f34254c3c843d403d89decb8229d026caacf66dce2d38de5a90273fbacbf13916b11966b054873a957a5388f8df2c588b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506379acc1d7fb1db94022de837f19089
SHA147699cecbd72619fc9071771b065e4c88bf1c9f8
SHA25626c76a039ddc67de16b89a375b1f20770cff19686894144f886c29a3d3bf3297
SHA512114f049c1867724013ebcd6a550892df4c61e62b47f73a8123b8dee88500e0932565bdad5e6f31ebd3d133680ff28309713dfedd0113c82d0b4af2dd9022ded0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eacf9e33f66ab5db4e418a0709d049d
SHA1f83762cc6e3f2f60e6ffd8ab911556b3586fad3d
SHA2564741ed0e5b2f2367733b55996232df2136c572584af5fca19d75af1751722e42
SHA512edfd6fa33962e8c35c736d5e6dd201269a3d1248f436f2758d606f000c8b0d443775a26658ddfb9c23947819855ba91ac5c0d70d63855ee436a98d2fbc59cc74
-
Filesize
1KB
MD5da7ebcf1cf2be0df7d334e05f292f795
SHA19188fd1c678076ab2ec80cb05b3a1bb50cf4d39e
SHA25656d14cb75a241a4b2fd80e295b33371bcba4c5056fc5960b5e6f55aa42fc8069
SHA51271e33efeb17019087b7fe045fd66b260f9666d96a261c54e787b525f76dea616b65ba43277e9b3dd735e3c57a600265de8b3f6cbe210e7830d6ab335296afa49
-
Filesize
1KB
MD5521f6f28b56a5eb104c3a86fe40262c1
SHA1999fba057cb1f3de3801df38f8f93028282637f2
SHA256b2495aa9eccea021463c04e20bea392f765e658fd75ce576db944b627ed1b9a2
SHA51273254a9a9d0a8b17fd1cd15c88079e97b4eb6713e66ae1154ad205be35cb4b97137f45d41b6c882b9acd0b5cb05209776cafb53b338dc9cd704928741a3f9c8a
-
Filesize
525B
MD571e5d75624fb15db1fe1823d91970bfc
SHA1dc6818acd580c2783cdf179b9666c2431635d74a
SHA256cda33cad1cb1b98ada97a1da54b6aa68637e1d4b23ce331475f789c3e1443de7
SHA512909438b40853351fe9d85a0bbeb0e2c50b739b893d474b6a2f44677511d06f05d08180bd8b38cf362eececf1b98ea86d59680a4e4da718c8b21872336f971cc9
-
Filesize
4KB
MD547a9141a3ff96c1b6594de6ee2807408
SHA1d292602f956de07cca3ff20d67c1b415532ec00a
SHA25684026b992068c9107023c9e87c055ca20011443b8fadfe364df4f76a9ad809e7
SHA512a9fdfa687ec21bce9ed299fffcfbb1ba8c96e5f3234a402d0654c2700c56a8eb9f3616b1ae9e1d9d87489eeb1950d521e2bd0ab2fa3a6e7a23c678f712260a07
-
Filesize
4KB
MD5d89927879ebff1eb8fba544f8ede5ba1
SHA1c6e62a5edc996f0eef03aa1bdd0f77807c4a6e4c
SHA25601d4fbc3c374b40d7908fd4cbbcc47158098674ba8a4b76cfa266e4fac36bfd2
SHA51259021cbaf80a88e359c072cfe23b73b620485117e1c6782c1d83056a3efa89bd96486d31132e50b6629e4de8b71eb22abb598d22cd1addc3f51c504e57b59f6b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06